Multiple Choice
During the commission of a crime, evidence is transferred between the offender's computer and the target. This is an example of:
A) Locard's Exchange Principle
B) Sutherland's General Theory of Criminology
C) Martin's Rule
D) Parkinson's Rule of Available Space
Correct Answer:

Verified
Correct Answer:
Verified
Q22: An example of the Entrenchment phase of
Q23: "Spear phishing" is an intrusion technique wherein
Q24: A valid profile of a computer intruder
Q25: The first stage of a computer intrusion
Q26: Discuss why computer intrusions are among the
Q28: Reverse social engineering is any attempt by
Q29: The registry key <b>HKLM\Software\Microsoft\Windows\Current <br></b>Version is one
Q30: The first step when investigating a computer
Q31: In a computer intrusion, the stage after
Q32: A more thorough method of collecting specific