Deck 13: Conclusions and Future Issues

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is true about the standard of accreditation of computer forensics?

A) The standard does not require a universal acceptance.
B) The standard does not require a mechanism for empirical testing and debate.
C) The standard requires a rigorous testing by all experts in the field.
D) The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is considered true about the use of computers in virtual reality?

A) It will comply with criminal statutes in real-world situations.
B) It will decrease incidences of victimization in real-world situations.
C) It will create an environment conducive to the exploitation of children.
D) It will result in civil libertarians promoting censorship legislation.
سؤال
Which of the following is true of remote data storage?

A) Search warrants for any location of remote data are likely to be ruled constitutional.
B) Remote data storage aids law enforcement authorities in obtaining incriminating information.
C) The practice of data stripping impedes the efforts of law enforcement agencies.
D) The lack of physicality facilitates the identification of the prevailing legal authority.
سؤال
Which of the following is true regarding the application of wireless communications?

A) It provides a mechanism for phone location, but not data on the cell site.
B) It presents difficulty in determining jurisdictional boundaries.
C) FCC regulations discourage service providers from locating phones.
D) The Supreme Court recognizes the concept of privacy in wireless communications.
سؤال
What do existing forfeiture statutes mandate?

A) All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
B) Legitimate money, seized with illegal money, will be returned after deducting a fine.
C) Legitimate revenue if combined with laundered funds can be seized.
D) Legitimate revenue cannot be seized under any circumstances.
سؤال
All of the following about creation of a law enforcement departmental Web page are true EXCEPT ________.

A) it is used to foster positive relations with the community
B) it illustrates commitment to contemporary problems
C) it provides a mechanism for community input
D) it is unsuited to anonymous reporting
سؤال
Self-proclaimed "experts" of computer forensics ________.

A) enhance prosecutorial efforts
B) often utilize unrecognized methodologies
C) are much harder to find than true experts
D) recognize their own limitations
سؤال
Technology has made information ________, thus exponentially increasing its value.

A) illegal
B) obsolete
C) actionable
D) important
سؤال
The establishment of an accreditation of forensic methodologies and examiners is expected to ________.

A) include both true experts and self-proclaimed experts
B) include only investigators, not forensic programmers
C) increase the likelihood of successful evidentiary challenges
D) increase awareness and extend professionalism
سؤال
The inclusion of true experts in the development of expertise in forensic methodologies and examiners would result in ________.

A) increased likelihood of successful evidentiary challenges
B) more professionalism in computer investigations
C) decreased awareness among the community
D) greater utilization of unrecognized methodologies
سؤال
What is the primary reason for the lack of nomenclature that has hindered the investigation and prosecution of computer-related crime?

A) the emergence of wireless technology
B) the vast number of viruses and worms unleashed upon the Internet
C) the reluctance of the Supreme Court to interpret emerging laws
D) the huge increase in seemingly average individuals who are willing to become first-time criminals
سؤال
Which of the following does NOT hinder the efforts of law enforcement authorities?

A) presence of anonymizer-type technology
B) availability of a search warrant for nonparticularized location of remote data
C) increased remote storage facilities
D) availability of disposable e-mail accounts
سؤال
Legislatures struggling with issues of state sovereignty must ensure that the federal government takes the role of ________.

A) mediator, not dictator
B) dictator, not mediator
C) both mediator and dictator
D) either mediator or dictator
سؤال
The development of ________ legislation encourages economic growth consistent with an emerging global market.

A) computer-specific
B) enforcement-friendly
C) virtual
D) content-restrictive
سؤال
Which of the following is true of establishing accountability for Internet users?

A) Confidentiality should be provided for legitimate users.
B) Anonymity should be given to users who seek it.
C) The expectation of privacy in private activities never conflicts with law enforcement interests.
D) The development of enforcement-friendly legislation is an uncomplicated task.
سؤال
All of the following statements about cell phone viruses are true EXCEPT which?

A) They are unwanted executable files.
B) They will decrease as universal operating systems emerge.
C) They become contagious after infection.
D) They can be spread by Internet downloads or Bluetooth wireless connection.
سؤال
Which of the following is NOT one of the traditional problems that must be overcome for there to be effective international cooperation and fewer jurisdictional disputes relating to digital evidence?

A) an overabundance of Multi-Lingual Assistance Treaties (MLATs) that create jurisdictional inconsistencies
B) the presence of cultural stereotypes and multicultural tensions
C) a lack of expertise in criminal justice and legal communities
D) a lack of global consensus on criminal behavior and human rights
سؤال
Which of the following is a potential benefit that regional or national central reporting stations could offer in an effort to conserve resources in the investigation of computer-related crime?

A) replace the data mining efforts of the NSA and other large federal intelligence agencies
B) provide on-site management assistance for electronic crime units and task forces
C) replace the federal system in which regional U.S. Attorneys' offices report ongoing investigations to the Computer Crime Section of the Department of Justice
D) provide funding to the federal government in the form of grants
سؤال
Which of the following statements is considered true regarding the development of computer-specific legislation?

A) It should ensure uniformity in application and interpretation within a selected jurisdiction.
B) It must be applicable to traditional problems, not to advanced technology.
C) It must be applicable to tomorrow's technology, not to traditional problems.
D) It should ensure uniformity in application and interpretation irrespective of jurisdictional climate.
سؤال
Which of the following was the Organization for Economic Cooperation and Development unable to accomplish in its efforts to promote international mandates on computer-related criminal activity?

A) It recognized that cultural differences must be overcome when circumstances dictate.
B) It published an evaluation of existing laws among international communities.
C) It established widespread consensus among member countries on a detailed list of abuses to prohibit and prosecute.
D) It suggested revisions to existing international laws.
سؤال
Which of the following practices can be employed to enhance the effectiveness of data mining?

A) standardization of data appearance
B) inclusion of duplicate records
C) insertion of anomalous data points
D) retention of compromised data fields
سؤال
Identifying causal relationships or depth and strength of connections is easy with data mining.
سؤال
Law enforcement authorities can tap into traditional telephonic exchanges more easily than into wireless communications.
سؤال
A letter rogatory is a request for assistance from one country's judicial authority to that of another country.
سؤال
Inaction by the Supreme Court has led to the investigation and prosecution of computer-related crime being hindered by a lack of ________.
سؤال
Predictive data mining is a valuable tool for the identification of crime trends and suspected terrorists.
سؤال
Standardization of accreditation for forensic examiners would increase Daubert/Frye challenges to the recovery of digital evidence.
سؤال
Data mining can be employed in analyzing intelligence and identifying terrorists.
سؤال
To govern decency on the Web, bills have introduced the proposal of using "E-chip" blocking software as information filters.
سؤال
The increase of remote data storage facilities is conducive to the efforts of law enforcement authorities.
سؤال
Standardization of accreditation does not require a universal acceptance or rigorous testing of all experts in the field.
سؤال
Legitimate revenue that is intermingled with money-laundered funds cannot be seized.
سؤال
Packet sniffing and ________ have proved to be favorite targets of organizations like EPIC and the ACLU.

A) data mining
B) anonymizer-type technology
C) over-the-counter encryption technology
D) disposable e-mail accounts
سؤال
Data mining can readily differentiate between good and bad data sources.
سؤال
The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings.
سؤال
Which of the following is considered one of the limitations of data mining as a popular analysis tool?

A) Data mining is incapable of revealing patterns.
B) Data mining's tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
C) Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
D) Data mining doesn't identify causal relationships or strength of connections.
سؤال
Teamwork between the law enforcement community and high-tech corporations will result in decreased reporting of criminal victimization among corporate targets.
سؤال
Which of the following statements is true of data mining?

A) Data quality is enhanced by the presence of duplicate records.
B) Data mining easily differentiates between good and bad data sources.
C) Data mining readily identifies causal relationships or depth and strength of connections.
D) Privacy advocates argue that data mining violates various constitutional rights.
سؤال
Presence of duplicate records can affect the quality of data in data mining.
سؤال
In the absence of Multi-Lingual Assistance Treaties (MLATs), international legal assistance is governed by domestic mutual legal assistance laws and practices.
سؤال
Member countries have been slow to react to international mandates for digital evidence preservation, citing ________ and American imperialism.
سؤال
Analyze the factors that necessitate the establishment of a standard of accreditation or expertise for computer forensics.Also list the issues to be addressed by such standardization.
سؤال
________ is a data hiding practice that fragments the data and places it on various servers.
سؤال
Federal authorities should develop ________ with enforcement components of other nations in the absence of Multi-Lingual Assistance Treaties.
سؤال
In the context of developing intradepartmental cooperation for computer-related crime, duplication of effort dramatically ________ the efficacy of dedicated efforts.
سؤال
FCC regulations instruct cellular providers to have the capability of locating phones within a ________ radius for longitude, latitude, and altitude.
سؤال
Legislation that mandates accountability of ________ servers should be developed to reduce the number of DOS attacks.
سؤال
The three operational modes of a model law enforcement agency are incident response, ________ management, and prevention.
سؤال
According to privacy advocates the practice of data mining, due to its limitations, violates ________.
سؤال
The effectiveness of data mining will be ________ by cleaning up data that has been compromised.
سؤال
Summarize the various types of data hiding practices that present unique challenges to law enforcement agencies.
سؤال
Internet downloads, Bluetooth wireless connection, and ________ are the ways by which cell phone viruses are spread via smart phones with connection and data capabilities.
سؤال
________ is the analysis of large data sets aimed at discovering patterns and relationships.
سؤال
A ________ is software that captures every action undertaken by an individual user of a suspect machine.
سؤال
Data mining practices have also been criticized for ________, as there appears to be a tendency to use mined data for things other than that which it was intended.
سؤال
Evaluate the role of data mining as an analysis tool in government agencies.Also include a note on limitations of data mining and ways to improve its effectiveness.
سؤال
________ statutes require businesses to assure the identity of their customers.
سؤال
Assess the benefits obtained by the relationship of the law enforcement community with the private sector in investigating and prosecuting computer-related crime.
سؤال
Match between columns
Department of Defense
compares its databases with those of the FBI to verify identities in Project Strikeback
Department of Defense
promotes awareness of best practices of cybersecurity
Department of Defense
employs software to analyze phone records and other voluminous data
Department of Defense
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Infrastructure Advisory Council
compares its databases with those of the FBI to verify identities in Project Strikeback
National Infrastructure Advisory Council
promotes awareness of best practices of cybersecurity
National Infrastructure Advisory Council
employs software to analyze phone records and other voluminous data
National Infrastructure Advisory Council
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Security Agency
compares its databases with those of the FBI to verify identities in Project Strikeback
National Security Agency
promotes awareness of best practices of cybersecurity
National Security Agency
employs software to analyze phone records and other voluminous data
National Security Agency
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
Department of Education
compares its databases with those of the FBI to verify identities in Project Strikeback
Department of Education
promotes awareness of best practices of cybersecurity
Department of Education
employs software to analyze phone records and other voluminous data
Department of Education
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
سؤال
Match between columns
E-chip blocking software
filters information, though unable to distinguish between legitimate and indecent information
E-chip blocking software
provides privacy and security for consumers by protecting data
E-chip blocking software
fragments data and places on various server's
Data encryption
filters information, though unable to distinguish between legitimate and indecent information
Data encryption
provides privacy and security for consumers by protecting data
Data encryption
fragments data and places on various server's
Data stripping
filters information, though unable to distinguish between legitimate and indecent information
Data stripping
provides privacy and security for consumers by protecting data
Data stripping
fragments data and places on various server's
سؤال
Match between columns
The Electronic Commerce and Consumer Protection Group
aims at the retention of data to identify online predator's
The Electronic Commerce and Consumer Protection Group
requests judicial assistance from another countivy
The Electronic Commerce and Consumer Protection Group
provides mechanism for communication in emergency situations
Letter rogatory
aims at the retention of data to identify online predator's
Letter rogatory
requests judicial assistance from another countivy
Letter rogatory
provides mechanism for communication in emergency situations
Departmental Web page
aims at the retention of data to identify online predator's
Departmental Web page
requests judicial assistance from another countivy
Departmental Web page
provides mechanism for communication in emergency situations
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/61
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Conclusions and Future Issues
1
Which of the following is true about the standard of accreditation of computer forensics?

A) The standard does not require a universal acceptance.
B) The standard does not require a mechanism for empirical testing and debate.
C) The standard requires a rigorous testing by all experts in the field.
D) The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
A
2
Which of the following is considered true about the use of computers in virtual reality?

A) It will comply with criminal statutes in real-world situations.
B) It will decrease incidences of victimization in real-world situations.
C) It will create an environment conducive to the exploitation of children.
D) It will result in civil libertarians promoting censorship legislation.
C
3
Which of the following is true of remote data storage?

A) Search warrants for any location of remote data are likely to be ruled constitutional.
B) Remote data storage aids law enforcement authorities in obtaining incriminating information.
C) The practice of data stripping impedes the efforts of law enforcement agencies.
D) The lack of physicality facilitates the identification of the prevailing legal authority.
C
4
Which of the following is true regarding the application of wireless communications?

A) It provides a mechanism for phone location, but not data on the cell site.
B) It presents difficulty in determining jurisdictional boundaries.
C) FCC regulations discourage service providers from locating phones.
D) The Supreme Court recognizes the concept of privacy in wireless communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
5
What do existing forfeiture statutes mandate?

A) All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
B) Legitimate money, seized with illegal money, will be returned after deducting a fine.
C) Legitimate revenue if combined with laundered funds can be seized.
D) Legitimate revenue cannot be seized under any circumstances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
6
All of the following about creation of a law enforcement departmental Web page are true EXCEPT ________.

A) it is used to foster positive relations with the community
B) it illustrates commitment to contemporary problems
C) it provides a mechanism for community input
D) it is unsuited to anonymous reporting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
7
Self-proclaimed "experts" of computer forensics ________.

A) enhance prosecutorial efforts
B) often utilize unrecognized methodologies
C) are much harder to find than true experts
D) recognize their own limitations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
8
Technology has made information ________, thus exponentially increasing its value.

A) illegal
B) obsolete
C) actionable
D) important
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
9
The establishment of an accreditation of forensic methodologies and examiners is expected to ________.

A) include both true experts and self-proclaimed experts
B) include only investigators, not forensic programmers
C) increase the likelihood of successful evidentiary challenges
D) increase awareness and extend professionalism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
10
The inclusion of true experts in the development of expertise in forensic methodologies and examiners would result in ________.

A) increased likelihood of successful evidentiary challenges
B) more professionalism in computer investigations
C) decreased awareness among the community
D) greater utilization of unrecognized methodologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is the primary reason for the lack of nomenclature that has hindered the investigation and prosecution of computer-related crime?

A) the emergence of wireless technology
B) the vast number of viruses and worms unleashed upon the Internet
C) the reluctance of the Supreme Court to interpret emerging laws
D) the huge increase in seemingly average individuals who are willing to become first-time criminals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following does NOT hinder the efforts of law enforcement authorities?

A) presence of anonymizer-type technology
B) availability of a search warrant for nonparticularized location of remote data
C) increased remote storage facilities
D) availability of disposable e-mail accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
13
Legislatures struggling with issues of state sovereignty must ensure that the federal government takes the role of ________.

A) mediator, not dictator
B) dictator, not mediator
C) both mediator and dictator
D) either mediator or dictator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
14
The development of ________ legislation encourages economic growth consistent with an emerging global market.

A) computer-specific
B) enforcement-friendly
C) virtual
D) content-restrictive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is true of establishing accountability for Internet users?

A) Confidentiality should be provided for legitimate users.
B) Anonymity should be given to users who seek it.
C) The expectation of privacy in private activities never conflicts with law enforcement interests.
D) The development of enforcement-friendly legislation is an uncomplicated task.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
16
All of the following statements about cell phone viruses are true EXCEPT which?

A) They are unwanted executable files.
B) They will decrease as universal operating systems emerge.
C) They become contagious after infection.
D) They can be spread by Internet downloads or Bluetooth wireless connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT one of the traditional problems that must be overcome for there to be effective international cooperation and fewer jurisdictional disputes relating to digital evidence?

A) an overabundance of Multi-Lingual Assistance Treaties (MLATs) that create jurisdictional inconsistencies
B) the presence of cultural stereotypes and multicultural tensions
C) a lack of expertise in criminal justice and legal communities
D) a lack of global consensus on criminal behavior and human rights
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is a potential benefit that regional or national central reporting stations could offer in an effort to conserve resources in the investigation of computer-related crime?

A) replace the data mining efforts of the NSA and other large federal intelligence agencies
B) provide on-site management assistance for electronic crime units and task forces
C) replace the federal system in which regional U.S. Attorneys' offices report ongoing investigations to the Computer Crime Section of the Department of Justice
D) provide funding to the federal government in the form of grants
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following statements is considered true regarding the development of computer-specific legislation?

A) It should ensure uniformity in application and interpretation within a selected jurisdiction.
B) It must be applicable to traditional problems, not to advanced technology.
C) It must be applicable to tomorrow's technology, not to traditional problems.
D) It should ensure uniformity in application and interpretation irrespective of jurisdictional climate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following was the Organization for Economic Cooperation and Development unable to accomplish in its efforts to promote international mandates on computer-related criminal activity?

A) It recognized that cultural differences must be overcome when circumstances dictate.
B) It published an evaluation of existing laws among international communities.
C) It established widespread consensus among member countries on a detailed list of abuses to prohibit and prosecute.
D) It suggested revisions to existing international laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following practices can be employed to enhance the effectiveness of data mining?

A) standardization of data appearance
B) inclusion of duplicate records
C) insertion of anomalous data points
D) retention of compromised data fields
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
22
Identifying causal relationships or depth and strength of connections is easy with data mining.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
23
Law enforcement authorities can tap into traditional telephonic exchanges more easily than into wireless communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
24
A letter rogatory is a request for assistance from one country's judicial authority to that of another country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
25
Inaction by the Supreme Court has led to the investigation and prosecution of computer-related crime being hindered by a lack of ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
26
Predictive data mining is a valuable tool for the identification of crime trends and suspected terrorists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
27
Standardization of accreditation for forensic examiners would increase Daubert/Frye challenges to the recovery of digital evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
28
Data mining can be employed in analyzing intelligence and identifying terrorists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
29
To govern decency on the Web, bills have introduced the proposal of using "E-chip" blocking software as information filters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
30
The increase of remote data storage facilities is conducive to the efforts of law enforcement authorities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
31
Standardization of accreditation does not require a universal acceptance or rigorous testing of all experts in the field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
32
Legitimate revenue that is intermingled with money-laundered funds cannot be seized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
33
Packet sniffing and ________ have proved to be favorite targets of organizations like EPIC and the ACLU.

A) data mining
B) anonymizer-type technology
C) over-the-counter encryption technology
D) disposable e-mail accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
34
Data mining can readily differentiate between good and bad data sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
35
The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is considered one of the limitations of data mining as a popular analysis tool?

A) Data mining is incapable of revealing patterns.
B) Data mining's tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
C) Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
D) Data mining doesn't identify causal relationships or strength of connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
37
Teamwork between the law enforcement community and high-tech corporations will result in decreased reporting of criminal victimization among corporate targets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following statements is true of data mining?

A) Data quality is enhanced by the presence of duplicate records.
B) Data mining easily differentiates between good and bad data sources.
C) Data mining readily identifies causal relationships or depth and strength of connections.
D) Privacy advocates argue that data mining violates various constitutional rights.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
39
Presence of duplicate records can affect the quality of data in data mining.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
40
In the absence of Multi-Lingual Assistance Treaties (MLATs), international legal assistance is governed by domestic mutual legal assistance laws and practices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
41
Member countries have been slow to react to international mandates for digital evidence preservation, citing ________ and American imperialism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
42
Analyze the factors that necessitate the establishment of a standard of accreditation or expertise for computer forensics.Also list the issues to be addressed by such standardization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ is a data hiding practice that fragments the data and places it on various servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
44
Federal authorities should develop ________ with enforcement components of other nations in the absence of Multi-Lingual Assistance Treaties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
45
In the context of developing intradepartmental cooperation for computer-related crime, duplication of effort dramatically ________ the efficacy of dedicated efforts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
46
FCC regulations instruct cellular providers to have the capability of locating phones within a ________ radius for longitude, latitude, and altitude.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
47
Legislation that mandates accountability of ________ servers should be developed to reduce the number of DOS attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
48
The three operational modes of a model law enforcement agency are incident response, ________ management, and prevention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
49
According to privacy advocates the practice of data mining, due to its limitations, violates ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
50
The effectiveness of data mining will be ________ by cleaning up data that has been compromised.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
51
Summarize the various types of data hiding practices that present unique challenges to law enforcement agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
52
Internet downloads, Bluetooth wireless connection, and ________ are the ways by which cell phone viruses are spread via smart phones with connection and data capabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ is the analysis of large data sets aimed at discovering patterns and relationships.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
54
A ________ is software that captures every action undertaken by an individual user of a suspect machine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
55
Data mining practices have also been criticized for ________, as there appears to be a tendency to use mined data for things other than that which it was intended.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
56
Evaluate the role of data mining as an analysis tool in government agencies.Also include a note on limitations of data mining and ways to improve its effectiveness.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
57
________ statutes require businesses to assure the identity of their customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
58
Assess the benefits obtained by the relationship of the law enforcement community with the private sector in investigating and prosecuting computer-related crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
59
Match between columns
Department of Defense
compares its databases with those of the FBI to verify identities in Project Strikeback
Department of Defense
promotes awareness of best practices of cybersecurity
Department of Defense
employs software to analyze phone records and other voluminous data
Department of Defense
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Infrastructure Advisory Council
compares its databases with those of the FBI to verify identities in Project Strikeback
National Infrastructure Advisory Council
promotes awareness of best practices of cybersecurity
National Infrastructure Advisory Council
employs software to analyze phone records and other voluminous data
National Infrastructure Advisory Council
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Security Agency
compares its databases with those of the FBI to verify identities in Project Strikeback
National Security Agency
promotes awareness of best practices of cybersecurity
National Security Agency
employs software to analyze phone records and other voluminous data
National Security Agency
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
Department of Education
compares its databases with those of the FBI to verify identities in Project Strikeback
Department of Education
promotes awareness of best practices of cybersecurity
Department of Education
employs software to analyze phone records and other voluminous data
Department of Education
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
60
Match between columns
E-chip blocking software
filters information, though unable to distinguish between legitimate and indecent information
E-chip blocking software
provides privacy and security for consumers by protecting data
E-chip blocking software
fragments data and places on various server's
Data encryption
filters information, though unable to distinguish between legitimate and indecent information
Data encryption
provides privacy and security for consumers by protecting data
Data encryption
fragments data and places on various server's
Data stripping
filters information, though unable to distinguish between legitimate and indecent information
Data stripping
provides privacy and security for consumers by protecting data
Data stripping
fragments data and places on various server's
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
61
Match between columns
The Electronic Commerce and Consumer Protection Group
aims at the retention of data to identify online predator's
The Electronic Commerce and Consumer Protection Group
requests judicial assistance from another countivy
The Electronic Commerce and Consumer Protection Group
provides mechanism for communication in emergency situations
Letter rogatory
aims at the retention of data to identify online predator's
Letter rogatory
requests judicial assistance from another countivy
Letter rogatory
provides mechanism for communication in emergency situations
Departmental Web page
aims at the retention of data to identify online predator's
Departmental Web page
requests judicial assistance from another countivy
Departmental Web page
provides mechanism for communication in emergency situations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 61 في هذه المجموعة.