A valid definition of digital evidence is: Data stored or Information of Digital data of Any digital evidence
transmitted using aprobative value probative value on a computer
computer
What are the three general categories of computer Desktop, laptop, Personal computer,Hardware, software, |Open computer
D
systems that can contain digital evidence? server Internet, mobile networks syystems,
talanhana- cammunicatian
In terms of digital evidence, a hard drive is an example |Open computer Communication Embedded INone of the above
3 A
of: Systems Systems computer systems
|In terms of digital evidence, a mobile telephone is an Open computer Communication Embedded None of the above
example of: Systems systems computer systems
In termsof digital evidence, a Smart Card is an open computer Lommunication Embedded None of the above
example of: systems systems Computer systems
In terms of digital evidence, the Internet is an example |Open computer Communication Embedded None of the above
B
OI: systems systems computer systems
Computers can be involved in which of the following|Homicide and sexual Computer intrusions| Civil disputes All of the above
|types of crime? assault and intellectual D
property theft
|A logon record tells us that, at a specific time: An unknown personThe owner of a The account was None of the above
logged into the specific account used to log into the
system using the logged into the system
account system
|Cybertrails are advantageous because: They are not Nobody can be They are easy to Offenders who are
connected to the harmed by crime on |follow. unaware of them
physical world the Internet. |leave behind more
clues than they D
otherwise would
have.
https:
//githu
b.com
/saura
Private networks can be a richer source of evidence vhath
They retain data for |Owners of privatePrivate networks All of the above.
than the Internet because: i/lpu-c
longer periods of networks are more contain a higher
10 time. cooperative with
|law enforcement.
concentration of
digital evidence. se
Due to caseload and budget constraints, often Each unreported Responsibility forThis approach Computer security
computer security professionals attempt to limit the incident robs incident resolution|results in under- professionals
attorneys and law frequently does not reporting of criminalldevelop loose
|damage and close each investigation as quickly as
possible. Which of the following is NOT a significant enforcement reside with the activity, deflating evidence processing
drawback to this approach? personnel of an security statistics that are habits
opportunity to learn |professional, but used to allocate that can make it
about the basics of with management. corporate and more difticult for B
computer-related |government law enforcement
crime. spending on personnel and
combating computer attorneys to
related crime. prosecute an
offender.
Locard's Exchange Differential Beccaria's Social INone of the above
The criminological principle which states that, when Principle |Association TheoryContract
12 anyone, or anything, enters a crime scene he/she takes A
something of the scene with him/her, and leaves
something of himself/herself behind, is:
The author of a series of threatening e-mails An individual An incidental A
class An indeterminate
13 consistently uses "im" instead of "I'm." This is an characteristic characteristic characteristic characteristic A
example of:
Criminal Prosecution Defense work |All of the above
Personal computers and networks are often a valuable investigation
4 D
source of evidence. Those involved with. should
|be comfortable with this technology
An argument for including computer forensic trainingIt provides an It provides them |It teaches them None of the above.
computer security specialists is: additional with the tools to when it is time to
15
credential. conduct their own call in law
investigations. enforcement.
Computers can play the following roles in a crime: Target, object, and Evidence, |Object, evidence, Symbol,
subject instrumentality, andtool |instrumentality, and B
contraband, or fruit source of evidence
of crime
about:blank 1/14
, 3/16/23, 9:50 PM Chapter 4 digital evidence
The first US law to address computer crime was: Computer Fraud and|Florida ComputerComputer Abuse Act| None of the above
Abuse Act (CFAA)Crime Act
First responder Forensic examiner Digital investigator All of the above
18
The following specializations exist in digital
linvestigations: (a.k.a. digital crime D
Scene tecnnician)
The first tool for making forensic copies of computer EnCase Expert Witness dd Safeback
storage media was:
|One of the most common approaches to validating Examine the sourceAsk others if the |Compare results ofComputer forensic
Z0 forensic software is to: code software is reliablemultiple tools for tool testing projects
|discrepancies
|An instrumentality of a crime is: An instrument used |A weapon or tool Anything that plays All of the above
1 to commit a crime designed to commit a significant role ina D
a crime crime
|. Contraband can include: Child pornography Devices or programs Encryption devices All of the above
22 for eavesdropping or applications
on communications
A
cloned mobile telephone is an example of Hardware as Hardware as an Information as Information as
contraband or fruits instrumentality contraband or fruitsevidence
of crime ofcrime
Digital photographs or videos of child exploitation is Hardware as Hardware as an |nformation as Information as
Z4 an example of: contraband or fruitsinstrumentality evidence raband or fruits D
of crime of crime
Stolen bank account information is an example of: Hardware as Information as Information as an Information as
25 contraband or fruits |contraband or fruits instrumentality evidence B
of crime of crime_
A network sniffer program is an example of: Hardware as Hardware as an Information as Information as
26 contraband or fruits instrumentality contraband or fruits evidence
of crime of crime
Computer equipment purchased with stolen credit |Hardware as Hardware as an Hardware as Information as
27 card information is an example of: contraband or fruits instrumentality evidence contraband or fruitsA
of crime of crime
A printer used for counterteiting is an example of: |Hardware as Hardware as an Hardware as Information as
28 contraband or fruitsinstrumentality evidence contraband or fruits
of crime of crime
Phone company records
https: are an example of: Hardware as Information as Information as an Information as
29
//githu contraband or fruits contraband or fruits instrumentality evidence
b.com
|of crime |of crime
/saura
vhath
i/lpu-c
se
In the course of conducting
forensic analysis, which of Critical thinking Fusion Validation |All of the above
20 D
the following actions are carried out:
|Having a member of the search team trained to handle |Can reduce the Can serve to Can reduce the All of the above
digital evidence: number of peoplestreamline the opportunity for
31 who handle the presentation of the opposing counsel to D
evidence case impugn the integrity
of the evidence
An attorney asking a digital investigator to find Influencing the Due diligence Quid pro quo Voir dire
32 evidence supporting a particular line of inquiry is an examiner
|example of:
|Logical reasoningCommon sense |Preconceived theory| nvestigators
investigator pursuing a line of investigation in intuition
33
a case because that line of investigation proved
Successtul in two previous cases is an example of:
Balance of Beyond a reasonable|Acquittal None of the above
A scientific truth attempts to identify roles that are probabilities |doubt
34
84
universally true. Legal judgment, on the other hand,
has a standard of proof in criminal prosecutions of:
Regarding the admissibility of evidence, which of the |Relevance Authenticity Best evidence |Nominally
B5 D
following is not a consideration: prejudicial
Uninformed consent| Forcible entry Obtained without None of the above
36 According to the text, the most common mistake that authorization
prevents evidence seized from being admitted is:
|In obtaining a warrant, an investigator must convince vidence of a crime A crime has been Ine owner or The evidence is
the judge on all of the following points except: |IS in existence committed resident of the place likely to exist at the
|
37 |to be searched is place to be searched
|likely to have
committed the
Crime
|If, while searching a computer for evidence of a |Abandon the |Continue with the Stop the search and Continue with the
specific crime, evidence of a new, unrelated crime is original search, andoriginal search but obtain a warrant original search,
38 discovered, the best course of action is: pursue the new linealso pursue the newthat addresses theignoring the new
of investigation nquiry new inquiry information
The process of documenting the seizure of digital Chain of custody Field notes Interim report None of the above
39 evidence and, in particular, when that evidence
changes hands, is known as:
about:blank 2/14