Solved

Match the Following Investigative Objectives to Their Proper Chain of Custody

Question 40

Matching

Match the following investigative objectives to their proper chain of custody practices.

Premises:
Scanner
Spoofer
Presumption of evidence
Document the activities
Password cracker
Anonymous remailer
Nuker
Preponderance of evidence
Proof beyond reasonable doubt
Presumption
Responses:
Used to break encrypted password files
Create a copy without altering the original
Verify the integrity of the copy to the source
Perform the technical analysis while retaining its integrity
Used to identify services running on a network
Tools used to mask a person's online identity
Keep detailed records and photographs
Software used to destroy system log trails
Ensure fairness in the evaluation
Used to impersonate someone else's identity

Correct Answer:

Scanner
Spoofer
Presumption of evidence
Document the activities
Password cracker
Anonymous remailer
Nuker
Preponderance of evidence
Proof beyond reasonable doubt
Presumption
Related Questions