Deck 2: Computer Forensics Anddigital Detective Work

ملء الشاشة (f)
exit full mode
سؤال
________ is created when a file is created if it does not take up an entire sector.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In the case in which a hacker named Maxim broke into CD Universe credit card files,the FBI and company employees accessed original files to determine how the intrusion had occurred.What was the impact on the case of working with original files?

A)There was no impact on the case,because a correct chain of custody form was produced.
B)The case was nullified,because the last-access dates on the original files were changed.
C)There was no impact on the case,because the original files were copied correctly.
D)The case was nullified,because the FBI did not have permission to open the original files.
سؤال
What type of program is available to delete and overwrite data on a computer?

A)File-overwriting software
B)File-deleting software
C)File-wiping software
D)All of the above
سؤال
In 2005,the estimated number of e-mail users in the United States was

A)105 million
B)105 billion
C)1.5 million
D)1.5 billion
سؤال
Which of the following is NOT considered one of the five stages of a computer investigation?

A)Intelligence
B)Hypothesis
C)Conviction
D)Conclusion
سؤال
Which of the following is NOT considered an objective in ensuring probative information is recovered?

A)To protect the computer system during the actual investigation
B)To search for any and all malware that may have infected the system
C)To recover deleted,existing,hidden,and password protected files
D)To determine if steganography was used
سؤال
What unique piece of evidence finally gave police the break they'd needed in order to solve the BTK serial murderer case?

A)A phone number located within a computer
B)A USB drive with his deleted address
C)A floppy disk with his deleted address
D)A floppy disk with a deleted address of a church
سؤال
The chain of custody must include which of the following items?

A)Where the evidence was stored
B)The size of the containers used to store the evidence
C)How heavy the evidence was when acquired
D)The relevance of the evidence
سؤال
Hackers go after valuable content such as

A)Expensive applications
B)Links to terrorist Web sites
C)Pricing data
D)Malware scripts
سؤال
Criminal trials are often preceded by a(n)________ at which the admissibility of evidence is determined.
سؤال
________ is a term generally used to indicate a message is hidden within another file.
سؤال
The ________ is documentation that the evidence was handled and preserved properly.
سؤال
Evidence may be suppressed if which of the following occurs?

A)If the officer exceeds the limited right or scope
B)If the police do not have a warrant
C)If the officer takes more than is on the warrant
D)All of the above
سؤال
Robert Hanssen stored documents he was stealing from the FBI and selling to the Russians on a(n)

A)MP3 player
B)Palm III PDA
C)Laptop computer
D)Cell phone
سؤال
The emphasis on computer forensics as a(n)________ is important because it recognizes the field as a discipline with set principles.
سؤال
Which of the following traditional crimes are easier because of widespread computer access?

A)Breaking and entering
B)Money laundering
C)Armed robbery
D)Assault
سؤال
Evidence collected in violation of which amendment will cause the evidence to be excluded?

A)The Fourth Amendment
B)The First Amendment
C)The Ninth Amendment
D)The Tenth Amendment
سؤال
In what manner were e-commerce employees caught making online purchases using clients' credit card numbers?

A)Copies of credit card numbers were found in their desks.
B)Copies of transactions were found at their homes.
C)Saved files were stored in a hidden directory.
D)Credit card numbers,along with the name and address of person who placed order,were found in a hidden HTML coded file.
سؤال
In order to be legally defensible,methods used in the recovery of data must ensure that

A)The original evidence was not altered.
B)No data was added to the original.
C)No data was deleted from the original.
D)All of the above
سؤال
Which of the following is NOT considered one of the items e-evidence is currently being used for?

A)To prove intent
B)To imply motive
C)To provide alibis
D)All listed are currently being used
سؤال
The ________ states that evidence collected in violation of the Fourth Amendment cannot be used in a trial.
سؤال
Care,control,and chain of custody are called the ________ of evidence.
سؤال
A(n)________ is a reasonable belief that a person has committed a crime.
سؤال
One of the more popular theories is that a person could actually commit ________ by changing a patient's medication data.
سؤال
If evidence items are released to auditors or authorities,the ________ should be recorded.
سؤال
According to a 2003 survey,________ and China had the highest piracy rates.
سؤال
________ is the blending of accounting,auditing,and investigative skills.
سؤال
Criminals whose purpose is ________ need to brag about their exploits because they are motivated by a desire for fame or notoriety.
سؤال
Match between columns
Illegal gambling
Computer is the crime instrument
Illegal gambling
New crime generated by prevalence of computers
Illegal gambling
Computer is the crime target
Illegal gambling
Computer is incidental to traditional crime
Theft of intellectual property
Computer is the crime instrument
Theft of intellectual property
New crime generated by prevalence of computers
Theft of intellectual property
Computer is the crime target
Theft of intellectual property
Computer is incidental to traditional crime
Fraud from computer billings
Computer is the crime instrument
Fraud from computer billings
New crime generated by prevalence of computers
Fraud from computer billings
Computer is the crime target
Fraud from computer billings
Computer is incidental to traditional crime
Software piracy
Computer is the crime instrument
Software piracy
New crime generated by prevalence of computers
Software piracy
Computer is the crime target
Software piracy
Computer is incidental to traditional crime
سؤال
Match between columns
Techno-vandalism
Phony Web sites
Techno-vandalism
Unauthorized access causes damage
Techno-vandalism
Criminal trespass
Techno-vandalism
Gives the user Admin rights
Root access
Phony Web sites
Root access
Unauthorized access causes damage
Root access
Criminal trespass
Root access
Gives the user Admin rights
Spoofing
Phony Web sites
Spoofing
Unauthorized access causes damage
Spoofing
Criminal trespass
Spoofing
Gives the user Admin rights
Techno-trespass
Phony Web sites
Techno-trespass
Unauthorized access causes damage
Techno-trespass
Criminal trespass
Techno-trespass
Gives the user Admin rights
سؤال
Match between columns
Sector
Smallest unit that can be accessed on a disk
Sector
Space not currently used to store an active file
Sector
Remnant area at the end of a file
Sector
Fixed block of data such as 1024 bytes
Unallocated space
Smallest unit that can be accessed on a disk
Unallocated space
Space not currently used to store an active file
Unallocated space
Remnant area at the end of a file
Unallocated space
Fixed block of data such as 1024 bytes
Slack space
Smallest unit that can be accessed on a disk
Slack space
Space not currently used to store an active file
Slack space
Remnant area at the end of a file
Slack space
Fixed block of data such as 1024 bytes
Cluster
Smallest unit that can be accessed on a disk
Cluster
Space not currently used to store an active file
Cluster
Remnant area at the end of a file
Cluster
Fixed block of data such as 1024 bytes
سؤال
Match between columns
John Allen Mohammad
Digital recordings on a device in car
John Allen Mohammad
E-mail communication between criminal and victim
John Allen Mohammad
GPS data from car and cell phone
John Allen Mohammad
Evidence of child pornography on computer
Lisa Montgomery
Digital recordings on a device in car
Lisa Montgomery
E-mail communication between criminal and victim
Lisa Montgomery
GPS data from car and cell phone
Lisa Montgomery
Evidence of child pornography on computer
Alejandro Avila
Digital recordings on a device in car
Alejandro Avila
E-mail communication between criminal and victim
Alejandro Avila
GPS data from car and cell phone
Alejandro Avila
Evidence of child pornography on computer
Scott Peterson
Digital recordings on a device in car
Scott Peterson
E-mail communication between criminal and victim
Scott Peterson
GPS data from car and cell phone
Scott Peterson
Evidence of child pornography on computer
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Computer Forensics Anddigital Detective Work
1
________ is created when a file is created if it does not take up an entire sector.
File slack
2
In the case in which a hacker named Maxim broke into CD Universe credit card files,the FBI and company employees accessed original files to determine how the intrusion had occurred.What was the impact on the case of working with original files?

A)There was no impact on the case,because a correct chain of custody form was produced.
B)The case was nullified,because the last-access dates on the original files were changed.
C)There was no impact on the case,because the original files were copied correctly.
D)The case was nullified,because the FBI did not have permission to open the original files.
B
3
What type of program is available to delete and overwrite data on a computer?

A)File-overwriting software
B)File-deleting software
C)File-wiping software
D)All of the above
C
4
In 2005,the estimated number of e-mail users in the United States was

A)105 million
B)105 billion
C)1.5 million
D)1.5 billion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT considered one of the five stages of a computer investigation?

A)Intelligence
B)Hypothesis
C)Conviction
D)Conclusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is NOT considered an objective in ensuring probative information is recovered?

A)To protect the computer system during the actual investigation
B)To search for any and all malware that may have infected the system
C)To recover deleted,existing,hidden,and password protected files
D)To determine if steganography was used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
What unique piece of evidence finally gave police the break they'd needed in order to solve the BTK serial murderer case?

A)A phone number located within a computer
B)A USB drive with his deleted address
C)A floppy disk with his deleted address
D)A floppy disk with a deleted address of a church
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
The chain of custody must include which of the following items?

A)Where the evidence was stored
B)The size of the containers used to store the evidence
C)How heavy the evidence was when acquired
D)The relevance of the evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
Hackers go after valuable content such as

A)Expensive applications
B)Links to terrorist Web sites
C)Pricing data
D)Malware scripts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
Criminal trials are often preceded by a(n)________ at which the admissibility of evidence is determined.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
________ is a term generally used to indicate a message is hidden within another file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ________ is documentation that the evidence was handled and preserved properly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
Evidence may be suppressed if which of the following occurs?

A)If the officer exceeds the limited right or scope
B)If the police do not have a warrant
C)If the officer takes more than is on the warrant
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
Robert Hanssen stored documents he was stealing from the FBI and selling to the Russians on a(n)

A)MP3 player
B)Palm III PDA
C)Laptop computer
D)Cell phone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
The emphasis on computer forensics as a(n)________ is important because it recognizes the field as a discipline with set principles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following traditional crimes are easier because of widespread computer access?

A)Breaking and entering
B)Money laundering
C)Armed robbery
D)Assault
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Evidence collected in violation of which amendment will cause the evidence to be excluded?

A)The Fourth Amendment
B)The First Amendment
C)The Ninth Amendment
D)The Tenth Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
In what manner were e-commerce employees caught making online purchases using clients' credit card numbers?

A)Copies of credit card numbers were found in their desks.
B)Copies of transactions were found at their homes.
C)Saved files were stored in a hidden directory.
D)Credit card numbers,along with the name and address of person who placed order,were found in a hidden HTML coded file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
In order to be legally defensible,methods used in the recovery of data must ensure that

A)The original evidence was not altered.
B)No data was added to the original.
C)No data was deleted from the original.
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is NOT considered one of the items e-evidence is currently being used for?

A)To prove intent
B)To imply motive
C)To provide alibis
D)All listed are currently being used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
The ________ states that evidence collected in violation of the Fourth Amendment cannot be used in a trial.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
Care,control,and chain of custody are called the ________ of evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n)________ is a reasonable belief that a person has committed a crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
One of the more popular theories is that a person could actually commit ________ by changing a patient's medication data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
If evidence items are released to auditors or authorities,the ________ should be recorded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
According to a 2003 survey,________ and China had the highest piracy rates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
________ is the blending of accounting,auditing,and investigative skills.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
Criminals whose purpose is ________ need to brag about their exploits because they are motivated by a desire for fame or notoriety.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match between columns
Illegal gambling
Computer is the crime instrument
Illegal gambling
New crime generated by prevalence of computers
Illegal gambling
Computer is the crime target
Illegal gambling
Computer is incidental to traditional crime
Theft of intellectual property
Computer is the crime instrument
Theft of intellectual property
New crime generated by prevalence of computers
Theft of intellectual property
Computer is the crime target
Theft of intellectual property
Computer is incidental to traditional crime
Fraud from computer billings
Computer is the crime instrument
Fraud from computer billings
New crime generated by prevalence of computers
Fraud from computer billings
Computer is the crime target
Fraud from computer billings
Computer is incidental to traditional crime
Software piracy
Computer is the crime instrument
Software piracy
New crime generated by prevalence of computers
Software piracy
Computer is the crime target
Software piracy
Computer is incidental to traditional crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match between columns
Techno-vandalism
Phony Web sites
Techno-vandalism
Unauthorized access causes damage
Techno-vandalism
Criminal trespass
Techno-vandalism
Gives the user Admin rights
Root access
Phony Web sites
Root access
Unauthorized access causes damage
Root access
Criminal trespass
Root access
Gives the user Admin rights
Spoofing
Phony Web sites
Spoofing
Unauthorized access causes damage
Spoofing
Criminal trespass
Spoofing
Gives the user Admin rights
Techno-trespass
Phony Web sites
Techno-trespass
Unauthorized access causes damage
Techno-trespass
Criminal trespass
Techno-trespass
Gives the user Admin rights
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match between columns
Sector
Smallest unit that can be accessed on a disk
Sector
Space not currently used to store an active file
Sector
Remnant area at the end of a file
Sector
Fixed block of data such as 1024 bytes
Unallocated space
Smallest unit that can be accessed on a disk
Unallocated space
Space not currently used to store an active file
Unallocated space
Remnant area at the end of a file
Unallocated space
Fixed block of data such as 1024 bytes
Slack space
Smallest unit that can be accessed on a disk
Slack space
Space not currently used to store an active file
Slack space
Remnant area at the end of a file
Slack space
Fixed block of data such as 1024 bytes
Cluster
Smallest unit that can be accessed on a disk
Cluster
Space not currently used to store an active file
Cluster
Remnant area at the end of a file
Cluster
Fixed block of data such as 1024 bytes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
Match between columns
John Allen Mohammad
Digital recordings on a device in car
John Allen Mohammad
E-mail communication between criminal and victim
John Allen Mohammad
GPS data from car and cell phone
John Allen Mohammad
Evidence of child pornography on computer
Lisa Montgomery
Digital recordings on a device in car
Lisa Montgomery
E-mail communication between criminal and victim
Lisa Montgomery
GPS data from car and cell phone
Lisa Montgomery
Evidence of child pornography on computer
Alejandro Avila
Digital recordings on a device in car
Alejandro Avila
E-mail communication between criminal and victim
Alejandro Avila
GPS data from car and cell phone
Alejandro Avila
Evidence of child pornography on computer
Scott Peterson
Digital recordings on a device in car
Scott Peterson
E-mail communication between criminal and victim
Scott Peterson
GPS data from car and cell phone
Scott Peterson
Evidence of child pornography on computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.