Deck 11: Fraud Examination Evidence III: Forensic Science and Computer Forensics

Full screen (f)
exit full mode
Question
Testimony by scientific experts is governed by which rule?

A) Rule 702.
B) FASB Statement 702.
C) SEC Section 702.
D) SOX section 702.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following do forensic scientists typically rely upon to solve crimes?

A) Physical evidence.
B) Witnesses.
C) Confessions.
D) All of the above.
Question
In which of the following types of crimes can computer forensics be used?

A) Terrorism.
B) destruction of data.
C) murder.
D) all of the above.
Question
Why must criminalists and forensic accountants work together at some crime scenes?

A) FASB has published a statement regarding their working together.
B) Sometimes a criminal may arson a building to cover up a financial crime.
C) Insurance companies require a financial audit if arson is expected.
D) Only criminalists are allowed into a crime scene and must gather evidence for the forensic accountant.
Question
When is a Daubert determination is normally made?

A) In the grand jury.
B) In a "mini-trial" that is held before the judge but outside the presence of the jury.
C) On appeal.
D) By the U.S. Supreme Court.
Question
Which of the following tests sets specific requirements for a technique or theory to be called scientific?

A) Litness.
B) Credential.
C) Frye.
D) Daubert.
Question
Paper documents, surface impressions on paper documents, and other types of surface impressions such as shoeprints and tire-tread impressions are known as:

A) Potential evidence.
B) Forensic data.
C) Questioned documents.
D) Criminalist functional areas.
Question
If someone is applying science to legal matters, they are practicing;

A) Forensic Accounting.
B) Forensic Science.
C) Forensic Law.
D) Forensic Engineering.
Question
What are the five divisions a crime lab it typically divided into?

A) Serology, unknown substances, trace evidence, ballistics and fingerprints.
B) Financial, arson, murder, rape and organized crime.
C) Corporate, organized crime, violent crime, white collar and blue collar.
D) Federal, State, County, Local and Special Victims.
Question
What is the Locard Exchange Principle?

A) It takes at least two people to commit a crime.
B) Every contact leaves a trace.
C) Forensic scientists must share data to solve a crime.
D) Some evidence will be lost when transferring it from the scene to the lab.
Question
Where do forensic scientists typically work?

A) At crime scenes.
B) In a corporate office.
C) From their homes.
D) In a crime lab.
Question
Why is a chain of custody important to maintain?

A) So that both the prosecution and defense can be assured that no one tampered with the evidence.
B) So that the defense is aware of what detectives have worked on the case.
C) To prove to the jury that the evidence came from the victim.
D) all of the above.
Question
Which of the following does a Criminalist do?

A) Find evidence at a crime scene.
B) Preserve evidence at a crime scene.
C) Collect evidence at a crime scene.
D) All of the above.
Question
What is an example of demonstrative evidence?

A) Handwriting.
B) Audio/video recordings.
C) Items physically carried into the court room.
D) Charts and graphs.
Question
How many types of evidence are there?

A) 2.
B) 4.
C) 6.
D) 8.
Question
Handwriting is considers to be what type of evidence?

A) Physical.
B) Substantive.
C) Relative.
D) Documentary.
Question
To establish forensic identification, the points of comparison for the suspect must

A) Possess the same physical characteristics.
B) Be confirmed by a second independent forensic scientist.
C) Uniquely correspond with those of the person who committed the crime.
D) Contain DNA samples of the person who committed the crime.
Question
What is biometrics?

A) Identifying a person through others recognizing them.
B) The art of reconstructing a persons identification through DNA samples.
C) Identifying persons by physical characteristics.
D) Identifying a person through their computer usage habits.
Question
DNA comparisons are generally considered:

A) 100% reliable.
B) Not as reliable as fingerprints.
C) Only as reliable as the crime lab that processes them.
D) Reliable, but still subject to error.
Question
Lie detector tests are typically not accepted by courts because they tend to measure:

A) Brain activity.
B) Subjective truth.
C) Objective evidence.
D) Stress.
Question
Under the Daubert test, in order for a technique or theory to be called scientific, the technique or theory should have been published in peer-reviewed scientific journals.
Data that is only logically deleted is protected and can be un-deleted any time before the user chooses the option to physically delete it.
Question
What is the wipe standard for the Department of Defense?

A) It states that media must be written over 7 times before it is considered erased.
B) It states that only a 7X power magnet can wipe out a hard drives contents.
C) A surface wipe with an ionic scope must be conducted prior to opening and removing any components.
D) The process of gathering the data stored in a computer's RAM.
Question
Which of the following systems deals specifically with fingerprints?

A) NDIS.
B) IAFIS.
C) CODIS.
D) NIBIN.
Question
A CART team consists of accountants who have the computer and accounting knowledge to determine criminal activities.
Question
All courts treat all scientific data the same.
Question
Forensic science can be described as:

A) using technology to uncover criminals behaviors.
B) a unique industry of accountants who uncover corruption and fraud.
C) the application of science to legal matters.
D) all of the above.
Question
The objective of indirect methods is not to identify specific transactions that could represent underpayments of tax although in some cases these methods lead to specific items.
Question
Forensic Accountants are crime-scene technicians or investigators who specialize in finding, collecting, and preserving physical evidence at crime scenes.
Question
How many keyboard strokes are typically stored in the RAM?

A) 256.
B) 512.
C) 760.
D) 1024.
Question
What type of information should a forensic accountant keep in their log of activities when dealing with computers?

A) names, dates, times, and computer serial numbers.
B) names, programs used and items found.
C) computer serial numbers, network types used and viruses found.
D) all of the above.
Question
In the court system, obtaining forensic identification is often not enough to convict a suspect.
Question
When the physical evidence can be specifically and unequivocally linked to a particular object or person, then the investigators have achieved:

A) a case that can bring charges.
B) guilt beyond a reasonable doubt.
C) criminal checks and balances.
D) forensic identification.
Question
The Locard Exchange Principle says that "every contact leaves a trace."
Question
How does Cache Storage work inside of a computer?

A) It is the high speed temporary are that the computer uses to process data.
B) It is the long term larger memory area of the computers.
C) It is a group of temporary files that the computer uses to help swap data from the RAM into the mass storage area.
D) It is the area of the computer that lets the system know what it's systems are when it is booting up.
Question
What does a packet sniffer do?

A) It replicates data being transmitted across the network to increase network speed.
B) It copies certain types of data packets and stores them for later use.
C) It finds E-mail programs and forces it to replicate false e-mails from a specific user.
D) It manipulates a computer into spreading viruses.
Question
If a computer that needs to be investigated is currently turned off, what should be done?

A) It should be turned on and investigative work should begin immediately.
B) It should be dismantled and the hard drive should be installed in a separate machine.
C) It should not be turned back on.
D) The main user of the computer should be made to turn it back on.
Question
Forensic accountants should be familiar with computer forensic procedures.
Question
Forensic Accountants have blanket authority to investigate crimes and do not need specific permission from a DA or judge to look into crimes.
Question
How can a user fake their IP address?

A) Through Spoofing.
B) By using a packet sniffer.
C) Through Spamming.
D) All of the above.
Question
Forensic Accountants may become a part of other forensic science specialties.
Question
What is the ultimate goal result of good physical evidence and when does it occur?
Question
Define forensic science and its earliest origins.
Question
Explain Rule 702 of the Federal Evidence Rules.
Question
What are the members of a CART team?
Question
How does a forensic scientist establish forensic identification?
Question
Describe some types of physical evidence.
Question
Describe the chain of custody and the challenges it presents with computers.
Question
Who are criminalists and what do they do?
Question
The Questioned Documents Unit examines what?
Question
What does computer forensics involve?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Fraud Examination Evidence III: Forensic Science and Computer Forensics
1
Testimony by scientific experts is governed by which rule?

A) Rule 702.
B) FASB Statement 702.
C) SEC Section 702.
D) SOX section 702.
A
2
Which of the following do forensic scientists typically rely upon to solve crimes?

A) Physical evidence.
B) Witnesses.
C) Confessions.
D) All of the above.
D
3
In which of the following types of crimes can computer forensics be used?

A) Terrorism.
B) destruction of data.
C) murder.
D) all of the above.
D
4
Why must criminalists and forensic accountants work together at some crime scenes?

A) FASB has published a statement regarding their working together.
B) Sometimes a criminal may arson a building to cover up a financial crime.
C) Insurance companies require a financial audit if arson is expected.
D) Only criminalists are allowed into a crime scene and must gather evidence for the forensic accountant.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
When is a Daubert determination is normally made?

A) In the grand jury.
B) In a "mini-trial" that is held before the judge but outside the presence of the jury.
C) On appeal.
D) By the U.S. Supreme Court.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following tests sets specific requirements for a technique or theory to be called scientific?

A) Litness.
B) Credential.
C) Frye.
D) Daubert.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Paper documents, surface impressions on paper documents, and other types of surface impressions such as shoeprints and tire-tread impressions are known as:

A) Potential evidence.
B) Forensic data.
C) Questioned documents.
D) Criminalist functional areas.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
If someone is applying science to legal matters, they are practicing;

A) Forensic Accounting.
B) Forensic Science.
C) Forensic Law.
D) Forensic Engineering.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What are the five divisions a crime lab it typically divided into?

A) Serology, unknown substances, trace evidence, ballistics and fingerprints.
B) Financial, arson, murder, rape and organized crime.
C) Corporate, organized crime, violent crime, white collar and blue collar.
D) Federal, State, County, Local and Special Victims.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What is the Locard Exchange Principle?

A) It takes at least two people to commit a crime.
B) Every contact leaves a trace.
C) Forensic scientists must share data to solve a crime.
D) Some evidence will be lost when transferring it from the scene to the lab.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Where do forensic scientists typically work?

A) At crime scenes.
B) In a corporate office.
C) From their homes.
D) In a crime lab.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Why is a chain of custody important to maintain?

A) So that both the prosecution and defense can be assured that no one tampered with the evidence.
B) So that the defense is aware of what detectives have worked on the case.
C) To prove to the jury that the evidence came from the victim.
D) all of the above.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following does a Criminalist do?

A) Find evidence at a crime scene.
B) Preserve evidence at a crime scene.
C) Collect evidence at a crime scene.
D) All of the above.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
What is an example of demonstrative evidence?

A) Handwriting.
B) Audio/video recordings.
C) Items physically carried into the court room.
D) Charts and graphs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
How many types of evidence are there?

A) 2.
B) 4.
C) 6.
D) 8.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Handwriting is considers to be what type of evidence?

A) Physical.
B) Substantive.
C) Relative.
D) Documentary.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
To establish forensic identification, the points of comparison for the suspect must

A) Possess the same physical characteristics.
B) Be confirmed by a second independent forensic scientist.
C) Uniquely correspond with those of the person who committed the crime.
D) Contain DNA samples of the person who committed the crime.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What is biometrics?

A) Identifying a person through others recognizing them.
B) The art of reconstructing a persons identification through DNA samples.
C) Identifying persons by physical characteristics.
D) Identifying a person through their computer usage habits.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
DNA comparisons are generally considered:

A) 100% reliable.
B) Not as reliable as fingerprints.
C) Only as reliable as the crime lab that processes them.
D) Reliable, but still subject to error.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Lie detector tests are typically not accepted by courts because they tend to measure:

A) Brain activity.
B) Subjective truth.
C) Objective evidence.
D) Stress.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Under the Daubert test, in order for a technique or theory to be called scientific, the technique or theory should have been published in peer-reviewed scientific journals.
Data that is only logically deleted is protected and can be un-deleted any time before the user chooses the option to physically delete it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What is the wipe standard for the Department of Defense?

A) It states that media must be written over 7 times before it is considered erased.
B) It states that only a 7X power magnet can wipe out a hard drives contents.
C) A surface wipe with an ionic scope must be conducted prior to opening and removing any components.
D) The process of gathering the data stored in a computer's RAM.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following systems deals specifically with fingerprints?

A) NDIS.
B) IAFIS.
C) CODIS.
D) NIBIN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A CART team consists of accountants who have the computer and accounting knowledge to determine criminal activities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
All courts treat all scientific data the same.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Forensic science can be described as:

A) using technology to uncover criminals behaviors.
B) a unique industry of accountants who uncover corruption and fraud.
C) the application of science to legal matters.
D) all of the above.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The objective of indirect methods is not to identify specific transactions that could represent underpayments of tax although in some cases these methods lead to specific items.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Forensic Accountants are crime-scene technicians or investigators who specialize in finding, collecting, and preserving physical evidence at crime scenes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
How many keyboard strokes are typically stored in the RAM?

A) 256.
B) 512.
C) 760.
D) 1024.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What type of information should a forensic accountant keep in their log of activities when dealing with computers?

A) names, dates, times, and computer serial numbers.
B) names, programs used and items found.
C) computer serial numbers, network types used and viruses found.
D) all of the above.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
In the court system, obtaining forensic identification is often not enough to convict a suspect.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
When the physical evidence can be specifically and unequivocally linked to a particular object or person, then the investigators have achieved:

A) a case that can bring charges.
B) guilt beyond a reasonable doubt.
C) criminal checks and balances.
D) forensic identification.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
The Locard Exchange Principle says that "every contact leaves a trace."
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
How does Cache Storage work inside of a computer?

A) It is the high speed temporary are that the computer uses to process data.
B) It is the long term larger memory area of the computers.
C) It is a group of temporary files that the computer uses to help swap data from the RAM into the mass storage area.
D) It is the area of the computer that lets the system know what it's systems are when it is booting up.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
What does a packet sniffer do?

A) It replicates data being transmitted across the network to increase network speed.
B) It copies certain types of data packets and stores them for later use.
C) It finds E-mail programs and forces it to replicate false e-mails from a specific user.
D) It manipulates a computer into spreading viruses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
If a computer that needs to be investigated is currently turned off, what should be done?

A) It should be turned on and investigative work should begin immediately.
B) It should be dismantled and the hard drive should be installed in a separate machine.
C) It should not be turned back on.
D) The main user of the computer should be made to turn it back on.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Forensic accountants should be familiar with computer forensic procedures.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Forensic Accountants have blanket authority to investigate crimes and do not need specific permission from a DA or judge to look into crimes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
How can a user fake their IP address?

A) Through Spoofing.
B) By using a packet sniffer.
C) Through Spamming.
D) All of the above.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Forensic Accountants may become a part of other forensic science specialties.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the ultimate goal result of good physical evidence and when does it occur?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Define forensic science and its earliest origins.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Explain Rule 702 of the Federal Evidence Rules.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What are the members of a CART team?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
How does a forensic scientist establish forensic identification?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe some types of physical evidence.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe the chain of custody and the challenges it presents with computers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Who are criminalists and what do they do?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
The Questioned Documents Unit examines what?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What does computer forensics involve?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.