Deck 13: Conclusions and Future Issues
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/61
Play
Full screen (f)
Deck 13: Conclusions and Future Issues
1
Which of the following is true about the standard of accreditation of computer forensics?
A) The standard does not require a universal acceptance.
B) The standard does not require a mechanism for empirical testing and debate.
C) The standard requires a rigorous testing by all experts in the field.
D) The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
A) The standard does not require a universal acceptance.
B) The standard does not require a mechanism for empirical testing and debate.
C) The standard requires a rigorous testing by all experts in the field.
D) The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
A
2
Which of the following is considered true about the use of computers in virtual reality?
A) It will comply with criminal statutes in real-world situations.
B) It will decrease incidences of victimization in real-world situations.
C) It will create an environment conducive to the exploitation of children.
D) It will result in civil libertarians promoting censorship legislation.
A) It will comply with criminal statutes in real-world situations.
B) It will decrease incidences of victimization in real-world situations.
C) It will create an environment conducive to the exploitation of children.
D) It will result in civil libertarians promoting censorship legislation.
C
3
Which of the following is true of remote data storage?
A) Search warrants for any location of remote data are likely to be ruled constitutional.
B) Remote data storage aids law enforcement authorities in obtaining incriminating information.
C) The practice of data stripping impedes the efforts of law enforcement agencies.
D) The lack of physicality facilitates the identification of the prevailing legal authority.
A) Search warrants for any location of remote data are likely to be ruled constitutional.
B) Remote data storage aids law enforcement authorities in obtaining incriminating information.
C) The practice of data stripping impedes the efforts of law enforcement agencies.
D) The lack of physicality facilitates the identification of the prevailing legal authority.
C
4
Which of the following is true regarding the application of wireless communications?
A) It provides a mechanism for phone location, but not data on the cell site.
B) It presents difficulty in determining jurisdictional boundaries.
C) FCC regulations discourage service providers from locating phones.
D) The Supreme Court recognizes the concept of privacy in wireless communications.
A) It provides a mechanism for phone location, but not data on the cell site.
B) It presents difficulty in determining jurisdictional boundaries.
C) FCC regulations discourage service providers from locating phones.
D) The Supreme Court recognizes the concept of privacy in wireless communications.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
5
What do existing forfeiture statutes mandate?
A) All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
B) Legitimate money, seized with illegal money, will be returned after deducting a fine.
C) Legitimate revenue if combined with laundered funds can be seized.
D) Legitimate revenue cannot be seized under any circumstances.
A) All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
B) Legitimate money, seized with illegal money, will be returned after deducting a fine.
C) Legitimate revenue if combined with laundered funds can be seized.
D) Legitimate revenue cannot be seized under any circumstances.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
6
All of the following about creation of a law enforcement departmental Web page are true EXCEPT ________.
A) it is used to foster positive relations with the community
B) it illustrates commitment to contemporary problems
C) it provides a mechanism for community input
D) it is unsuited to anonymous reporting
A) it is used to foster positive relations with the community
B) it illustrates commitment to contemporary problems
C) it provides a mechanism for community input
D) it is unsuited to anonymous reporting
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
7
Self-proclaimed "experts" of computer forensics ________.
A) enhance prosecutorial efforts
B) often utilize unrecognized methodologies
C) are much harder to find than true experts
D) recognize their own limitations
A) enhance prosecutorial efforts
B) often utilize unrecognized methodologies
C) are much harder to find than true experts
D) recognize their own limitations
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
8
Technology has made information ________, thus exponentially increasing its value.
A) illegal
B) obsolete
C) actionable
D) important
A) illegal
B) obsolete
C) actionable
D) important
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
9
The establishment of an accreditation of forensic methodologies and examiners is expected to ________.
A) include both true experts and self-proclaimed experts
B) include only investigators, not forensic programmers
C) increase the likelihood of successful evidentiary challenges
D) increase awareness and extend professionalism
A) include both true experts and self-proclaimed experts
B) include only investigators, not forensic programmers
C) increase the likelihood of successful evidentiary challenges
D) increase awareness and extend professionalism
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
10
The inclusion of true experts in the development of expertise in forensic methodologies and examiners would result in ________.
A) increased likelihood of successful evidentiary challenges
B) more professionalism in computer investigations
C) decreased awareness among the community
D) greater utilization of unrecognized methodologies
A) increased likelihood of successful evidentiary challenges
B) more professionalism in computer investigations
C) decreased awareness among the community
D) greater utilization of unrecognized methodologies
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
11
What is the primary reason for the lack of nomenclature that has hindered the investigation and prosecution of computer-related crime?
A) the emergence of wireless technology
B) the vast number of viruses and worms unleashed upon the Internet
C) the reluctance of the Supreme Court to interpret emerging laws
D) the huge increase in seemingly average individuals who are willing to become first-time criminals
A) the emergence of wireless technology
B) the vast number of viruses and worms unleashed upon the Internet
C) the reluctance of the Supreme Court to interpret emerging laws
D) the huge increase in seemingly average individuals who are willing to become first-time criminals
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following does NOT hinder the efforts of law enforcement authorities?
A) presence of anonymizer-type technology
B) availability of a search warrant for nonparticularized location of remote data
C) increased remote storage facilities
D) availability of disposable e-mail accounts
A) presence of anonymizer-type technology
B) availability of a search warrant for nonparticularized location of remote data
C) increased remote storage facilities
D) availability of disposable e-mail accounts
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
13
Legislatures struggling with issues of state sovereignty must ensure that the federal government takes the role of ________.
A) mediator, not dictator
B) dictator, not mediator
C) both mediator and dictator
D) either mediator or dictator
A) mediator, not dictator
B) dictator, not mediator
C) both mediator and dictator
D) either mediator or dictator
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
14
The development of ________ legislation encourages economic growth consistent with an emerging global market.
A) computer-specific
B) enforcement-friendly
C) virtual
D) content-restrictive
A) computer-specific
B) enforcement-friendly
C) virtual
D) content-restrictive
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is true of establishing accountability for Internet users?
A) Confidentiality should be provided for legitimate users.
B) Anonymity should be given to users who seek it.
C) The expectation of privacy in private activities never conflicts with law enforcement interests.
D) The development of enforcement-friendly legislation is an uncomplicated task.
A) Confidentiality should be provided for legitimate users.
B) Anonymity should be given to users who seek it.
C) The expectation of privacy in private activities never conflicts with law enforcement interests.
D) The development of enforcement-friendly legislation is an uncomplicated task.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
16
All of the following statements about cell phone viruses are true EXCEPT which?
A) They are unwanted executable files.
B) They will decrease as universal operating systems emerge.
C) They become contagious after infection.
D) They can be spread by Internet downloads or Bluetooth wireless connection.
A) They are unwanted executable files.
B) They will decrease as universal operating systems emerge.
C) They become contagious after infection.
D) They can be spread by Internet downloads or Bluetooth wireless connection.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT one of the traditional problems that must be overcome for there to be effective international cooperation and fewer jurisdictional disputes relating to digital evidence?
A) an overabundance of Multi-Lingual Assistance Treaties (MLATs) that create jurisdictional inconsistencies
B) the presence of cultural stereotypes and multicultural tensions
C) a lack of expertise in criminal justice and legal communities
D) a lack of global consensus on criminal behavior and human rights
A) an overabundance of Multi-Lingual Assistance Treaties (MLATs) that create jurisdictional inconsistencies
B) the presence of cultural stereotypes and multicultural tensions
C) a lack of expertise in criminal justice and legal communities
D) a lack of global consensus on criminal behavior and human rights
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is a potential benefit that regional or national central reporting stations could offer in an effort to conserve resources in the investigation of computer-related crime?
A) replace the data mining efforts of the NSA and other large federal intelligence agencies
B) provide on-site management assistance for electronic crime units and task forces
C) replace the federal system in which regional U.S. Attorneys' offices report ongoing investigations to the Computer Crime Section of the Department of Justice
D) provide funding to the federal government in the form of grants
A) replace the data mining efforts of the NSA and other large federal intelligence agencies
B) provide on-site management assistance for electronic crime units and task forces
C) replace the federal system in which regional U.S. Attorneys' offices report ongoing investigations to the Computer Crime Section of the Department of Justice
D) provide funding to the federal government in the form of grants
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following statements is considered true regarding the development of computer-specific legislation?
A) It should ensure uniformity in application and interpretation within a selected jurisdiction.
B) It must be applicable to traditional problems, not to advanced technology.
C) It must be applicable to tomorrow's technology, not to traditional problems.
D) It should ensure uniformity in application and interpretation irrespective of jurisdictional climate.
A) It should ensure uniformity in application and interpretation within a selected jurisdiction.
B) It must be applicable to traditional problems, not to advanced technology.
C) It must be applicable to tomorrow's technology, not to traditional problems.
D) It should ensure uniformity in application and interpretation irrespective of jurisdictional climate.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following was the Organization for Economic Cooperation and Development unable to accomplish in its efforts to promote international mandates on computer-related criminal activity?
A) It recognized that cultural differences must be overcome when circumstances dictate.
B) It published an evaluation of existing laws among international communities.
C) It established widespread consensus among member countries on a detailed list of abuses to prohibit and prosecute.
D) It suggested revisions to existing international laws.
A) It recognized that cultural differences must be overcome when circumstances dictate.
B) It published an evaluation of existing laws among international communities.
C) It established widespread consensus among member countries on a detailed list of abuses to prohibit and prosecute.
D) It suggested revisions to existing international laws.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following practices can be employed to enhance the effectiveness of data mining?
A) standardization of data appearance
B) inclusion of duplicate records
C) insertion of anomalous data points
D) retention of compromised data fields
A) standardization of data appearance
B) inclusion of duplicate records
C) insertion of anomalous data points
D) retention of compromised data fields
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
22
Identifying causal relationships or depth and strength of connections is easy with data mining.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
23
Law enforcement authorities can tap into traditional telephonic exchanges more easily than into wireless communications.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
24
A letter rogatory is a request for assistance from one country's judicial authority to that of another country.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
25
Inaction by the Supreme Court has led to the investigation and prosecution of computer-related crime being hindered by a lack of ________.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
26
Predictive data mining is a valuable tool for the identification of crime trends and suspected terrorists.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
27
Standardization of accreditation for forensic examiners would increase Daubert/Frye challenges to the recovery of digital evidence.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
28
Data mining can be employed in analyzing intelligence and identifying terrorists.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
29
To govern decency on the Web, bills have introduced the proposal of using "E-chip" blocking software as information filters.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
30
The increase of remote data storage facilities is conducive to the efforts of law enforcement authorities.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
31
Standardization of accreditation does not require a universal acceptance or rigorous testing of all experts in the field.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
32
Legitimate revenue that is intermingled with money-laundered funds cannot be seized.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
33
Packet sniffing and ________ have proved to be favorite targets of organizations like EPIC and the ACLU.
A) data mining
B) anonymizer-type technology
C) over-the-counter encryption technology
D) disposable e-mail accounts
A) data mining
B) anonymizer-type technology
C) over-the-counter encryption technology
D) disposable e-mail accounts
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
34
Data mining can readily differentiate between good and bad data sources.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
35
The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is considered one of the limitations of data mining as a popular analysis tool?
A) Data mining is incapable of revealing patterns.
B) Data mining's tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
C) Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
D) Data mining doesn't identify causal relationships or strength of connections.
A) Data mining is incapable of revealing patterns.
B) Data mining's tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
C) Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
D) Data mining doesn't identify causal relationships or strength of connections.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
37
Teamwork between the law enforcement community and high-tech corporations will result in decreased reporting of criminal victimization among corporate targets.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following statements is true of data mining?
A) Data quality is enhanced by the presence of duplicate records.
B) Data mining easily differentiates between good and bad data sources.
C) Data mining readily identifies causal relationships or depth and strength of connections.
D) Privacy advocates argue that data mining violates various constitutional rights.
A) Data quality is enhanced by the presence of duplicate records.
B) Data mining easily differentiates between good and bad data sources.
C) Data mining readily identifies causal relationships or depth and strength of connections.
D) Privacy advocates argue that data mining violates various constitutional rights.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
39
Presence of duplicate records can affect the quality of data in data mining.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
40
In the absence of Multi-Lingual Assistance Treaties (MLATs), international legal assistance is governed by domestic mutual legal assistance laws and practices.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
41
Member countries have been slow to react to international mandates for digital evidence preservation, citing ________ and American imperialism.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
42
Analyze the factors that necessitate the establishment of a standard of accreditation or expertise for computer forensics.Also list the issues to be addressed by such standardization.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
43
________ is a data hiding practice that fragments the data and places it on various servers.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
44
Federal authorities should develop ________ with enforcement components of other nations in the absence of Multi-Lingual Assistance Treaties.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
45
In the context of developing intradepartmental cooperation for computer-related crime, duplication of effort dramatically ________ the efficacy of dedicated efforts.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
46
FCC regulations instruct cellular providers to have the capability of locating phones within a ________ radius for longitude, latitude, and altitude.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
47
Legislation that mandates accountability of ________ servers should be developed to reduce the number of DOS attacks.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
48
The three operational modes of a model law enforcement agency are incident response, ________ management, and prevention.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
49
According to privacy advocates the practice of data mining, due to its limitations, violates ________.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
50
The effectiveness of data mining will be ________ by cleaning up data that has been compromised.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
51
Summarize the various types of data hiding practices that present unique challenges to law enforcement agencies.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
52
Internet downloads, Bluetooth wireless connection, and ________ are the ways by which cell phone viruses are spread via smart phones with connection and data capabilities.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
53
________ is the analysis of large data sets aimed at discovering patterns and relationships.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
54
A ________ is software that captures every action undertaken by an individual user of a suspect machine.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
55
Data mining practices have also been criticized for ________, as there appears to be a tendency to use mined data for things other than that which it was intended.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
56
Evaluate the role of data mining as an analysis tool in government agencies.Also include a note on limitations of data mining and ways to improve its effectiveness.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
57
________ statutes require businesses to assure the identity of their customers.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
58
Assess the benefits obtained by the relationship of the law enforcement community with the private sector in investigating and prosecuting computer-related crime.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
59
Match between columns
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
60
Match between columns
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck