Deck 10: Violent Crime and Digital Evidence
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
العب
ملء الشاشة (f)
Deck 10: Violent Crime and Digital Evidence
1
A thief who has programmed and released a virus to roam a network looking for victim passwords used for online banking is an example of what offense behavior?
A) Power assertive
B) Profit oriented
C) Power reassurance
D) Anger retaliatory
A) Power assertive
B) Profit oriented
C) Power reassurance
D) Anger retaliatory
B
2
When reconstructing evidence surrounding a violent crime, it is generally helpful to:
A) Diagram the crime scene
B) Create a timeline of events from digital evidence
C) Create a threat assessment report
D) None of the above
A) Diagram the crime scene
B) Create a timeline of events from digital evidence
C) Create a threat assessment report
D) None of the above
B
3
When reconstructing evidence surrounding a violent crime, it is generally helpful to:
A) Lay out all the evidence so it can be viewed in its entirety
B) Work with the crime scene technicians so that a better understanding of the crime is achieved
C) Construct a timeline of events from digital evidence
D) Begin the process of converting field notes to a final report
A) Lay out all the evidence so it can be viewed in its entirety
B) Work with the crime scene technicians so that a better understanding of the crime is achieved
C) Construct a timeline of events from digital evidence
D) Begin the process of converting field notes to a final report
C
4
Data from Internet service providers used by the victim or suspect can help determine their activities around the time of the crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
Crime scenes fall into two categories - primary and .
A) Remote
B) Secondary
C) Ancillary
D) Theoretical
A) Remote
B) Secondary
C) Ancillary
D) Theoretical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
Victimology is the assessment of the offender as he relates to the crime scene, the incident, and the criminal justice system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
Although crime scenes are typically photographed, it is a good idea to create diagrams of the crime scene because:
A) Diagramming is a common crime scene technician's skill; however, it requires continual practice.
B) The process of creating a diagram can result in a digital investigator noticing an important item of evidence that would otherwise have been missed.
C) The quality of photographs taken at the crime scene is not known until the film is developed.
D) None of the above.
A) Diagramming is a common crime scene technician's skill; however, it requires continual practice.
B) The process of creating a diagram can result in a digital investigator noticing an important item of evidence that would otherwise have been missed.
C) The quality of photographs taken at the crime scene is not known until the film is developed.
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
The case of a Michigan bank robber requiring tellers to undress so he could photograph them is an example of:
A) Deviant aberrant behavior
B) Criminal humor
C) Crime scene characteristics
D) Investigative reconstruction
A) Deviant aberrant behavior
B) Criminal humor
C) Crime scene characteristics
D) Investigative reconstruction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
When swift action is needed, law enforcement personnel may be permitted to conduct searches without a warrant. Searches of this kind are permitted under:
A) Exigent circumstances
B) Eminent domain
C) Mens rea
D) USA PATRIOT ACT
A) Exigent circumstances
B) Eminent domain
C) Mens rea
D) USA PATRIOT ACT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
The assessment of the victim as they relate to the offender, the crime scene, the incident, and the criminal justice system is known as:
A) Threat assessment methodology
B) Signature behaviors
C) Behavioral evidence analysis
D) Victimology
A) Threat assessment methodology
B) Signature behaviors
C) Behavioral evidence analysis
D) Victimology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
Computers and mobile devices are treated as__________ crime scenes in violent crime investigations.
A) Temporary
B) Immediate
C) Remote
D) Secondary
A) Temporary
B) Immediate
C) Remote
D) Secondary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
How the offender approaches and obtains control of a victim or target is significant because it exposes the offender's:
A) Motives
B) Choice of weapons
C) Modus operandi
D) Signature behaviors
A) Motives
B) Choice of weapons
C) Modus operandi
D) Signature behaviors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
Every violent crime investigation should incorporate digital evidence because digital evidence may reveal:
A) Investigative leads
B) Likely suspects
C) Previously unknown crimes
D) All the above
A) Investigative leads
B) Likely suspects
C) Previously unknown crimes
D) All the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
Given the scope and consequences of violent crimes, when collecting digital evidence it is advisable to:
A) Collect only that digital evidence that is clearly connected to the offense
B) Focus only on the primary crime scene, as searching the offender's home and workplace requires additional authorization
C) Seek out and preserve all available digital evidence
D) Focus only on the offender's digital evidence, as the victim's digital evidence is usually of little value
A) Collect only that digital evidence that is clearly connected to the offense
B) Focus only on the primary crime scene, as searching the offender's home and workplace requires additional authorization
C) Seek out and preserve all available digital evidence
D) Focus only on the offender's digital evidence, as the victim's digital evidence is usually of little value
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
Digital investigators can use information gleaned from many forms of digital evidence to find likely suspects and develop leads.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
The Federal statute that has a provision allowing Internet service providers to disclose subscriber information to law enforcement in exigent circumstances is:
A) ECPA
B) CCPA
C) The Privacy Act
D) FCRA
A) ECPA
B) CCPA
C) The Privacy Act
D) FCRA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
The key to any investigation is luck, which has value only when it is properly acted upon.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
Mobile devices may contain information about communications as well as audio or video recordings relating to an offense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
When processing the digital crime scene in a violent crime investigation it is important to have_________ to ensure that all digital evidence and findings can hold up under close scrutiny.
A) A good supply of electrostatic bags for holding sensitive electronic components
B) More than one reliable camera for photographing the crime scene
C) Standard operating procedures for processing a digital crime scene
D) A good supply of nitrile gloves
A) A good supply of electrostatic bags for holding sensitive electronic components
B) More than one reliable camera for photographing the crime scene
C) Standard operating procedures for processing a digital crime scene
D) A good supply of nitrile gloves
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
One reason not to put too much trust into those who run the company's computers is that:
A) There has always been an antagonism between system administrators and law enforcement.
B) They are typically too busy to take the time to answer your questions.
C) They are usually not authorized to answer questions.
D) They may be the offenders.
A) There has always been an antagonism between system administrators and law enforcement.
B) They are typically too busy to take the time to answer your questions.
C) They are usually not authorized to answer questions.
D) They may be the offenders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
When investigating a violent crime, it is important to obtain proper authorization to examine the primary crime scene; however, secondary crime scenes are typically covered under that authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
The investigator reconstruction process involves pulling all evidence together and letting it speak for itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
It is safe to place your trust in an organization's IT staff, since forensic training is a basic requirement in most IT departments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
A Mincey warrant, which is easier to obtain, is an option when investigators really believe there is some emergency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
When reconstructing evidence surrounding a violent crime, it is helpful to create a timeline of events from digital evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
Computers and mobile devices are treated as primary crime scenes in violent crime investigations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
When investigating suspects of a violent crime, it is important to look for behaviors that leave digital traces.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
Privately owned networks are usually a poor source of information when investigating violent crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
What an offender does at a crime scene typically reveals little useful information to digital investigators.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck

