Deck 2: Computer Forensics Anddigital Detective Work
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
Match between columns
سؤال
Match between columns
سؤال
Match between columns
سؤال
Match between columns
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
العب
ملء الشاشة (f)
Deck 2: Computer Forensics Anddigital Detective Work
1
________ is created when a file is created if it does not take up an entire sector.
File slack
2
In the case in which a hacker named Maxim broke into CD Universe credit card files,the FBI and company employees accessed original files to determine how the intrusion had occurred.What was the impact on the case of working with original files?
A)There was no impact on the case,because a correct chain of custody form was produced.
B)The case was nullified,because the last-access dates on the original files were changed.
C)There was no impact on the case,because the original files were copied correctly.
D)The case was nullified,because the FBI did not have permission to open the original files.
A)There was no impact on the case,because a correct chain of custody form was produced.
B)The case was nullified,because the last-access dates on the original files were changed.
C)There was no impact on the case,because the original files were copied correctly.
D)The case was nullified,because the FBI did not have permission to open the original files.
B
3
What type of program is available to delete and overwrite data on a computer?
A)File-overwriting software
B)File-deleting software
C)File-wiping software
D)All of the above
A)File-overwriting software
B)File-deleting software
C)File-wiping software
D)All of the above
C
4
In 2005,the estimated number of e-mail users in the United States was
A)105 million
B)105 billion
C)1.5 million
D)1.5 billion
A)105 million
B)105 billion
C)1.5 million
D)1.5 billion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT considered one of the five stages of a computer investigation?
A)Intelligence
B)Hypothesis
C)Conviction
D)Conclusion
A)Intelligence
B)Hypothesis
C)Conviction
D)Conclusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is NOT considered an objective in ensuring probative information is recovered?
A)To protect the computer system during the actual investigation
B)To search for any and all malware that may have infected the system
C)To recover deleted,existing,hidden,and password protected files
D)To determine if steganography was used
A)To protect the computer system during the actual investigation
B)To search for any and all malware that may have infected the system
C)To recover deleted,existing,hidden,and password protected files
D)To determine if steganography was used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
What unique piece of evidence finally gave police the break they'd needed in order to solve the BTK serial murderer case?
A)A phone number located within a computer
B)A USB drive with his deleted address
C)A floppy disk with his deleted address
D)A floppy disk with a deleted address of a church
A)A phone number located within a computer
B)A USB drive with his deleted address
C)A floppy disk with his deleted address
D)A floppy disk with a deleted address of a church
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
The chain of custody must include which of the following items?
A)Where the evidence was stored
B)The size of the containers used to store the evidence
C)How heavy the evidence was when acquired
D)The relevance of the evidence
A)Where the evidence was stored
B)The size of the containers used to store the evidence
C)How heavy the evidence was when acquired
D)The relevance of the evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
Hackers go after valuable content such as
A)Expensive applications
B)Links to terrorist Web sites
C)Pricing data
D)Malware scripts
A)Expensive applications
B)Links to terrorist Web sites
C)Pricing data
D)Malware scripts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
Criminal trials are often preceded by a(n)________ at which the admissibility of evidence is determined.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
________ is a term generally used to indicate a message is hidden within another file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ________ is documentation that the evidence was handled and preserved properly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
Evidence may be suppressed if which of the following occurs?
A)If the officer exceeds the limited right or scope
B)If the police do not have a warrant
C)If the officer takes more than is on the warrant
D)All of the above
A)If the officer exceeds the limited right or scope
B)If the police do not have a warrant
C)If the officer takes more than is on the warrant
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
Robert Hanssen stored documents he was stealing from the FBI and selling to the Russians on a(n)
A)MP3 player
B)Palm III PDA
C)Laptop computer
D)Cell phone
A)MP3 player
B)Palm III PDA
C)Laptop computer
D)Cell phone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
The emphasis on computer forensics as a(n)________ is important because it recognizes the field as a discipline with set principles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following traditional crimes are easier because of widespread computer access?
A)Breaking and entering
B)Money laundering
C)Armed robbery
D)Assault
A)Breaking and entering
B)Money laundering
C)Armed robbery
D)Assault
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Evidence collected in violation of which amendment will cause the evidence to be excluded?
A)The Fourth Amendment
B)The First Amendment
C)The Ninth Amendment
D)The Tenth Amendment
A)The Fourth Amendment
B)The First Amendment
C)The Ninth Amendment
D)The Tenth Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
In what manner were e-commerce employees caught making online purchases using clients' credit card numbers?
A)Copies of credit card numbers were found in their desks.
B)Copies of transactions were found at their homes.
C)Saved files were stored in a hidden directory.
D)Credit card numbers,along with the name and address of person who placed order,were found in a hidden HTML coded file.
A)Copies of credit card numbers were found in their desks.
B)Copies of transactions were found at their homes.
C)Saved files were stored in a hidden directory.
D)Credit card numbers,along with the name and address of person who placed order,were found in a hidden HTML coded file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
In order to be legally defensible,methods used in the recovery of data must ensure that
A)The original evidence was not altered.
B)No data was added to the original.
C)No data was deleted from the original.
D)All of the above
A)The original evidence was not altered.
B)No data was added to the original.
C)No data was deleted from the original.
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is NOT considered one of the items e-evidence is currently being used for?
A)To prove intent
B)To imply motive
C)To provide alibis
D)All listed are currently being used
A)To prove intent
B)To imply motive
C)To provide alibis
D)All listed are currently being used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
The ________ states that evidence collected in violation of the Fourth Amendment cannot be used in a trial.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
Care,control,and chain of custody are called the ________ of evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n)________ is a reasonable belief that a person has committed a crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
One of the more popular theories is that a person could actually commit ________ by changing a patient's medication data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
If evidence items are released to auditors or authorities,the ________ should be recorded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
According to a 2003 survey,________ and China had the highest piracy rates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
________ is the blending of accounting,auditing,and investigative skills.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
Criminals whose purpose is ________ need to brag about their exploits because they are motivated by a desire for fame or notoriety.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck