Deck 8: Digital Evidence, Computer Forensics, and Investigation
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
العب
ملء الشاشة (f)
Deck 8: Digital Evidence, Computer Forensics, and Investigation
1
Which of the following is not a device that generate digital evidence?
A) cell phone
B) laptop
C) smart watch
D) thermostat
A) cell phone
B) laptop
C) smart watch
D) thermostat
D
2
Which of the following is least likely to involve computers in commission of a crime?
A) child pornography
B) car theft
C) fraud
D) kidnapping
A) child pornography
B) car theft
C) fraud
D) kidnapping
B
3
Which of the following is the least important aspect of investigating a cyber crime scene?
A) search the neighborhood surrounding the crime scene
B) secure electronic devices
C) protect evidence from data storage from change or alteration
D) search for evidence that would identify the owner of the device
A) search the neighborhood surrounding the crime scene
B) secure electronic devices
C) protect evidence from data storage from change or alteration
D) search for evidence that would identify the owner of the device
A
4
Which of the following is not recent federal legislation that affects computer crime?
A) Cybersecurity Information Act
B) Federal Exchange Data Breach Notifications Act
C) Consumer Privacy Protection Act
D) US Consumer Advocacy Act
A) Cybersecurity Information Act
B) Federal Exchange Data Breach Notifications Act
C) Consumer Privacy Protection Act
D) US Consumer Advocacy Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is not part of a preliminary computer crime investigation?
A) Check if device is on and turn it off immediately
B) Determine if a crime has been committed
C) Examination of the device
D) Look for physical evidence if the computer crime was part of a physical crime
A) Check if device is on and turn it off immediately
B) Determine if a crime has been committed
C) Examination of the device
D) Look for physical evidence if the computer crime was part of a physical crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following principles allows computer evidence to be seized without a warrant?
A) The exigent circumstances doctrine
B) The occupant of the apartment is not the owner
C) The electronic device is a cell phone
D) The electronic device is turned off
A) The exigent circumstances doctrine
B) The occupant of the apartment is not the owner
C) The electronic device is a cell phone
D) The electronic device is turned off
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is not an important component of a computer crime investigation?
A) Obtain a search warrant if required
B) Determine who will testify in court if there is a trial
C) Identify potential suspects
D) What type of electronic device is to be seized
A) Obtain a search warrant if required
B) Determine who will testify in court if there is a trial
C) Identify potential suspects
D) What type of electronic device is to be seized
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is not important data that should be gathered about an electronic device prior to seizure?
A) What apps are on the device
B) Is there security in place on the system including passwords
C) What, if any laws have been violated
D) Is there probable cause of a crime having been committed
A) What apps are on the device
B) Is there security in place on the system including passwords
C) What, if any laws have been violated
D) Is there probable cause of a crime having been committed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is not an important component of recording a computer crime scene?
A) The configuration of the computer network
B) The suspect computer displays
C) Sketching the location where the device is located
D) External components of the computer or other device
A) The configuration of the computer network
B) The suspect computer displays
C) Sketching the location where the device is located
D) External components of the computer or other device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
What precaution should be taken to prevent the remote destruction of the data in a mobile device?
A) placing in a sealed, airtight plastic bag
B) wrapping it in aluminum foil
C) placing in a Faraday cage
D) none of the above because it is not possible to destroy data remotely
A) placing in a sealed, airtight plastic bag
B) wrapping it in aluminum foil
C) placing in a Faraday cage
D) none of the above because it is not possible to destroy data remotely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
Forensic analysis of computers usually involves making one or more copies of the contents of a hard drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Computer forensics is the study of computer technology as it relates to the law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
Computer crimes are only concerned with laptop or tablet computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
The vast majority of computer-related crimes are prosecuted and most end up as convictions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Child pornography is almost never committed using computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
"Cyber crime", "computer crime" and "e-crime" all mean the same thing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Identity theft crimes have become major computer crimes in recent years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
If a computer is found to be on at a crime scene, it should be immediately turned off to prevent data wipe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
The problem of computer viruses has been ignored by federal and state laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
In a preliminary computer crime investigation, it is always assumed that a crime has occurred.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck

