Deck 8: Digital Evidence, Computer Forensics, and Investigation
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 8: Digital Evidence, Computer Forensics, and Investigation
1
Which of the following is not a device that generate digital evidence?
A) cell phone
B) laptop
C) smart watch
D) thermostat
A) cell phone
B) laptop
C) smart watch
D) thermostat
D
2
Which of the following is least likely to involve computers in commission of a crime?
A) child pornography
B) car theft
C) fraud
D) kidnapping
A) child pornography
B) car theft
C) fraud
D) kidnapping
B
3
Which of the following is the least important aspect of investigating a cyber crime scene?
A) search the neighborhood surrounding the crime scene
B) secure electronic devices
C) protect evidence from data storage from change or alteration
D) search for evidence that would identify the owner of the device
A) search the neighborhood surrounding the crime scene
B) secure electronic devices
C) protect evidence from data storage from change or alteration
D) search for evidence that would identify the owner of the device
A
4
Which of the following is not recent federal legislation that affects computer crime?
A) Cybersecurity Information Act
B) Federal Exchange Data Breach Notifications Act
C) Consumer Privacy Protection Act
D) US Consumer Advocacy Act
A) Cybersecurity Information Act
B) Federal Exchange Data Breach Notifications Act
C) Consumer Privacy Protection Act
D) US Consumer Advocacy Act
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not part of a preliminary computer crime investigation?
A) Check if device is on and turn it off immediately
B) Determine if a crime has been committed
C) Examination of the device
D) Look for physical evidence if the computer crime was part of a physical crime
A) Check if device is on and turn it off immediately
B) Determine if a crime has been committed
C) Examination of the device
D) Look for physical evidence if the computer crime was part of a physical crime
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following principles allows computer evidence to be seized without a warrant?
A) The exigent circumstances doctrine
B) The occupant of the apartment is not the owner
C) The electronic device is a cell phone
D) The electronic device is turned off
A) The exigent circumstances doctrine
B) The occupant of the apartment is not the owner
C) The electronic device is a cell phone
D) The electronic device is turned off
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not an important component of a computer crime investigation?
A) Obtain a search warrant if required
B) Determine who will testify in court if there is a trial
C) Identify potential suspects
D) What type of electronic device is to be seized
A) Obtain a search warrant if required
B) Determine who will testify in court if there is a trial
C) Identify potential suspects
D) What type of electronic device is to be seized
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not important data that should be gathered about an electronic device prior to seizure?
A) What apps are on the device
B) Is there security in place on the system including passwords
C) What, if any laws have been violated
D) Is there probable cause of a crime having been committed
A) What apps are on the device
B) Is there security in place on the system including passwords
C) What, if any laws have been violated
D) Is there probable cause of a crime having been committed
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not an important component of recording a computer crime scene?
A) The configuration of the computer network
B) The suspect computer displays
C) Sketching the location where the device is located
D) External components of the computer or other device
A) The configuration of the computer network
B) The suspect computer displays
C) Sketching the location where the device is located
D) External components of the computer or other device
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
What precaution should be taken to prevent the remote destruction of the data in a mobile device?
A) placing in a sealed, airtight plastic bag
B) wrapping it in aluminum foil
C) placing in a Faraday cage
D) none of the above because it is not possible to destroy data remotely
A) placing in a sealed, airtight plastic bag
B) wrapping it in aluminum foil
C) placing in a Faraday cage
D) none of the above because it is not possible to destroy data remotely
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Forensic analysis of computers usually involves making one or more copies of the contents of a hard drive.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Computer forensics is the study of computer technology as it relates to the law.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Computer crimes are only concerned with laptop or tablet computers.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
The vast majority of computer-related crimes are prosecuted and most end up as convictions.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Child pornography is almost never committed using computers.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
"Cyber crime", "computer crime" and "e-crime" all mean the same thing.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Identity theft crimes have become major computer crimes in recent years.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
If a computer is found to be on at a crime scene, it should be immediately turned off to prevent data wipe.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
The problem of computer viruses has been ignored by federal and state laws.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
In a preliminary computer crime investigation, it is always assumed that a crime has occurred.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck