Deck 13: Conclusions and Future Issues
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
Match between columns
سؤال
Match between columns
سؤال
Match between columns
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/61
العب
ملء الشاشة (f)
Deck 13: Conclusions and Future Issues
1
Which of the following is true about the standard of accreditation of computer forensics?
A) The standard does not require a universal acceptance.
B) The standard does not require a mechanism for empirical testing and debate.
C) The standard requires a rigorous testing by all experts in the field.
D) The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
A) The standard does not require a universal acceptance.
B) The standard does not require a mechanism for empirical testing and debate.
C) The standard requires a rigorous testing by all experts in the field.
D) The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
A
2
Which of the following is considered true about the use of computers in virtual reality?
A) It will comply with criminal statutes in real-world situations.
B) It will decrease incidences of victimization in real-world situations.
C) It will create an environment conducive to the exploitation of children.
D) It will result in civil libertarians promoting censorship legislation.
A) It will comply with criminal statutes in real-world situations.
B) It will decrease incidences of victimization in real-world situations.
C) It will create an environment conducive to the exploitation of children.
D) It will result in civil libertarians promoting censorship legislation.
C
3
Which of the following is true of remote data storage?
A) Search warrants for any location of remote data are likely to be ruled constitutional.
B) Remote data storage aids law enforcement authorities in obtaining incriminating information.
C) The practice of data stripping impedes the efforts of law enforcement agencies.
D) The lack of physicality facilitates the identification of the prevailing legal authority.
A) Search warrants for any location of remote data are likely to be ruled constitutional.
B) Remote data storage aids law enforcement authorities in obtaining incriminating information.
C) The practice of data stripping impedes the efforts of law enforcement agencies.
D) The lack of physicality facilitates the identification of the prevailing legal authority.
C
4
Which of the following is true regarding the application of wireless communications?
A) It provides a mechanism for phone location, but not data on the cell site.
B) It presents difficulty in determining jurisdictional boundaries.
C) FCC regulations discourage service providers from locating phones.
D) The Supreme Court recognizes the concept of privacy in wireless communications.
A) It provides a mechanism for phone location, but not data on the cell site.
B) It presents difficulty in determining jurisdictional boundaries.
C) FCC regulations discourage service providers from locating phones.
D) The Supreme Court recognizes the concept of privacy in wireless communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
5
What do existing forfeiture statutes mandate?
A) All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
B) Legitimate money, seized with illegal money, will be returned after deducting a fine.
C) Legitimate revenue if combined with laundered funds can be seized.
D) Legitimate revenue cannot be seized under any circumstances.
A) All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
B) Legitimate money, seized with illegal money, will be returned after deducting a fine.
C) Legitimate revenue if combined with laundered funds can be seized.
D) Legitimate revenue cannot be seized under any circumstances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
6
All of the following about creation of a law enforcement departmental Web page are true EXCEPT ________.
A) it is used to foster positive relations with the community
B) it illustrates commitment to contemporary problems
C) it provides a mechanism for community input
D) it is unsuited to anonymous reporting
A) it is used to foster positive relations with the community
B) it illustrates commitment to contemporary problems
C) it provides a mechanism for community input
D) it is unsuited to anonymous reporting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
7
Self-proclaimed "experts" of computer forensics ________.
A) enhance prosecutorial efforts
B) often utilize unrecognized methodologies
C) are much harder to find than true experts
D) recognize their own limitations
A) enhance prosecutorial efforts
B) often utilize unrecognized methodologies
C) are much harder to find than true experts
D) recognize their own limitations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
8
Technology has made information ________, thus exponentially increasing its value.
A) illegal
B) obsolete
C) actionable
D) important
A) illegal
B) obsolete
C) actionable
D) important
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
9
The establishment of an accreditation of forensic methodologies and examiners is expected to ________.
A) include both true experts and self-proclaimed experts
B) include only investigators, not forensic programmers
C) increase the likelihood of successful evidentiary challenges
D) increase awareness and extend professionalism
A) include both true experts and self-proclaimed experts
B) include only investigators, not forensic programmers
C) increase the likelihood of successful evidentiary challenges
D) increase awareness and extend professionalism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
10
The inclusion of true experts in the development of expertise in forensic methodologies and examiners would result in ________.
A) increased likelihood of successful evidentiary challenges
B) more professionalism in computer investigations
C) decreased awareness among the community
D) greater utilization of unrecognized methodologies
A) increased likelihood of successful evidentiary challenges
B) more professionalism in computer investigations
C) decreased awareness among the community
D) greater utilization of unrecognized methodologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is the primary reason for the lack of nomenclature that has hindered the investigation and prosecution of computer-related crime?
A) the emergence of wireless technology
B) the vast number of viruses and worms unleashed upon the Internet
C) the reluctance of the Supreme Court to interpret emerging laws
D) the huge increase in seemingly average individuals who are willing to become first-time criminals
A) the emergence of wireless technology
B) the vast number of viruses and worms unleashed upon the Internet
C) the reluctance of the Supreme Court to interpret emerging laws
D) the huge increase in seemingly average individuals who are willing to become first-time criminals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following does NOT hinder the efforts of law enforcement authorities?
A) presence of anonymizer-type technology
B) availability of a search warrant for nonparticularized location of remote data
C) increased remote storage facilities
D) availability of disposable e-mail accounts
A) presence of anonymizer-type technology
B) availability of a search warrant for nonparticularized location of remote data
C) increased remote storage facilities
D) availability of disposable e-mail accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
13
Legislatures struggling with issues of state sovereignty must ensure that the federal government takes the role of ________.
A) mediator, not dictator
B) dictator, not mediator
C) both mediator and dictator
D) either mediator or dictator
A) mediator, not dictator
B) dictator, not mediator
C) both mediator and dictator
D) either mediator or dictator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
14
The development of ________ legislation encourages economic growth consistent with an emerging global market.
A) computer-specific
B) enforcement-friendly
C) virtual
D) content-restrictive
A) computer-specific
B) enforcement-friendly
C) virtual
D) content-restrictive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is true of establishing accountability for Internet users?
A) Confidentiality should be provided for legitimate users.
B) Anonymity should be given to users who seek it.
C) The expectation of privacy in private activities never conflicts with law enforcement interests.
D) The development of enforcement-friendly legislation is an uncomplicated task.
A) Confidentiality should be provided for legitimate users.
B) Anonymity should be given to users who seek it.
C) The expectation of privacy in private activities never conflicts with law enforcement interests.
D) The development of enforcement-friendly legislation is an uncomplicated task.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
16
All of the following statements about cell phone viruses are true EXCEPT which?
A) They are unwanted executable files.
B) They will decrease as universal operating systems emerge.
C) They become contagious after infection.
D) They can be spread by Internet downloads or Bluetooth wireless connection.
A) They are unwanted executable files.
B) They will decrease as universal operating systems emerge.
C) They become contagious after infection.
D) They can be spread by Internet downloads or Bluetooth wireless connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT one of the traditional problems that must be overcome for there to be effective international cooperation and fewer jurisdictional disputes relating to digital evidence?
A) an overabundance of Multi-Lingual Assistance Treaties (MLATs) that create jurisdictional inconsistencies
B) the presence of cultural stereotypes and multicultural tensions
C) a lack of expertise in criminal justice and legal communities
D) a lack of global consensus on criminal behavior and human rights
A) an overabundance of Multi-Lingual Assistance Treaties (MLATs) that create jurisdictional inconsistencies
B) the presence of cultural stereotypes and multicultural tensions
C) a lack of expertise in criminal justice and legal communities
D) a lack of global consensus on criminal behavior and human rights
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is a potential benefit that regional or national central reporting stations could offer in an effort to conserve resources in the investigation of computer-related crime?
A) replace the data mining efforts of the NSA and other large federal intelligence agencies
B) provide on-site management assistance for electronic crime units and task forces
C) replace the federal system in which regional U.S. Attorneys' offices report ongoing investigations to the Computer Crime Section of the Department of Justice
D) provide funding to the federal government in the form of grants
A) replace the data mining efforts of the NSA and other large federal intelligence agencies
B) provide on-site management assistance for electronic crime units and task forces
C) replace the federal system in which regional U.S. Attorneys' offices report ongoing investigations to the Computer Crime Section of the Department of Justice
D) provide funding to the federal government in the form of grants
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following statements is considered true regarding the development of computer-specific legislation?
A) It should ensure uniformity in application and interpretation within a selected jurisdiction.
B) It must be applicable to traditional problems, not to advanced technology.
C) It must be applicable to tomorrow's technology, not to traditional problems.
D) It should ensure uniformity in application and interpretation irrespective of jurisdictional climate.
A) It should ensure uniformity in application and interpretation within a selected jurisdiction.
B) It must be applicable to traditional problems, not to advanced technology.
C) It must be applicable to tomorrow's technology, not to traditional problems.
D) It should ensure uniformity in application and interpretation irrespective of jurisdictional climate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following was the Organization for Economic Cooperation and Development unable to accomplish in its efforts to promote international mandates on computer-related criminal activity?
A) It recognized that cultural differences must be overcome when circumstances dictate.
B) It published an evaluation of existing laws among international communities.
C) It established widespread consensus among member countries on a detailed list of abuses to prohibit and prosecute.
D) It suggested revisions to existing international laws.
A) It recognized that cultural differences must be overcome when circumstances dictate.
B) It published an evaluation of existing laws among international communities.
C) It established widespread consensus among member countries on a detailed list of abuses to prohibit and prosecute.
D) It suggested revisions to existing international laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following practices can be employed to enhance the effectiveness of data mining?
A) standardization of data appearance
B) inclusion of duplicate records
C) insertion of anomalous data points
D) retention of compromised data fields
A) standardization of data appearance
B) inclusion of duplicate records
C) insertion of anomalous data points
D) retention of compromised data fields
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
22
Identifying causal relationships or depth and strength of connections is easy with data mining.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
23
Law enforcement authorities can tap into traditional telephonic exchanges more easily than into wireless communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
24
A letter rogatory is a request for assistance from one country's judicial authority to that of another country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
25
Inaction by the Supreme Court has led to the investigation and prosecution of computer-related crime being hindered by a lack of ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
26
Predictive data mining is a valuable tool for the identification of crime trends and suspected terrorists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
27
Standardization of accreditation for forensic examiners would increase Daubert/Frye challenges to the recovery of digital evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
28
Data mining can be employed in analyzing intelligence and identifying terrorists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
29
To govern decency on the Web, bills have introduced the proposal of using "E-chip" blocking software as information filters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
30
The increase of remote data storage facilities is conducive to the efforts of law enforcement authorities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
31
Standardization of accreditation does not require a universal acceptance or rigorous testing of all experts in the field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
32
Legitimate revenue that is intermingled with money-laundered funds cannot be seized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
33
Packet sniffing and ________ have proved to be favorite targets of organizations like EPIC and the ACLU.
A) data mining
B) anonymizer-type technology
C) over-the-counter encryption technology
D) disposable e-mail accounts
A) data mining
B) anonymizer-type technology
C) over-the-counter encryption technology
D) disposable e-mail accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
34
Data mining can readily differentiate between good and bad data sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
35
The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is considered one of the limitations of data mining as a popular analysis tool?
A) Data mining is incapable of revealing patterns.
B) Data mining's tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
C) Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
D) Data mining doesn't identify causal relationships or strength of connections.
A) Data mining is incapable of revealing patterns.
B) Data mining's tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
C) Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
D) Data mining doesn't identify causal relationships or strength of connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
37
Teamwork between the law enforcement community and high-tech corporations will result in decreased reporting of criminal victimization among corporate targets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following statements is true of data mining?
A) Data quality is enhanced by the presence of duplicate records.
B) Data mining easily differentiates between good and bad data sources.
C) Data mining readily identifies causal relationships or depth and strength of connections.
D) Privacy advocates argue that data mining violates various constitutional rights.
A) Data quality is enhanced by the presence of duplicate records.
B) Data mining easily differentiates between good and bad data sources.
C) Data mining readily identifies causal relationships or depth and strength of connections.
D) Privacy advocates argue that data mining violates various constitutional rights.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
39
Presence of duplicate records can affect the quality of data in data mining.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
40
In the absence of Multi-Lingual Assistance Treaties (MLATs), international legal assistance is governed by domestic mutual legal assistance laws and practices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
41
Member countries have been slow to react to international mandates for digital evidence preservation, citing ________ and American imperialism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
42
Analyze the factors that necessitate the establishment of a standard of accreditation or expertise for computer forensics.Also list the issues to be addressed by such standardization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ is a data hiding practice that fragments the data and places it on various servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
44
Federal authorities should develop ________ with enforcement components of other nations in the absence of Multi-Lingual Assistance Treaties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
45
In the context of developing intradepartmental cooperation for computer-related crime, duplication of effort dramatically ________ the efficacy of dedicated efforts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
46
FCC regulations instruct cellular providers to have the capability of locating phones within a ________ radius for longitude, latitude, and altitude.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
47
Legislation that mandates accountability of ________ servers should be developed to reduce the number of DOS attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
48
The three operational modes of a model law enforcement agency are incident response, ________ management, and prevention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
49
According to privacy advocates the practice of data mining, due to its limitations, violates ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
50
The effectiveness of data mining will be ________ by cleaning up data that has been compromised.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
51
Summarize the various types of data hiding practices that present unique challenges to law enforcement agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
52
Internet downloads, Bluetooth wireless connection, and ________ are the ways by which cell phone viruses are spread via smart phones with connection and data capabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ is the analysis of large data sets aimed at discovering patterns and relationships.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
54
A ________ is software that captures every action undertaken by an individual user of a suspect machine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
55
Data mining practices have also been criticized for ________, as there appears to be a tendency to use mined data for things other than that which it was intended.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
56
Evaluate the role of data mining as an analysis tool in government agencies.Also include a note on limitations of data mining and ways to improve its effectiveness.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
57
________ statutes require businesses to assure the identity of their customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
58
Assess the benefits obtained by the relationship of the law enforcement community with the private sector in investigating and prosecuting computer-related crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
59
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
60
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
61
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck

