Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

inspriration of cyber security

Beoordeling
-
Verkocht
-
Pagina's
13
Geüpload op
10-08-2023
Geschreven in
2022/2023

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. · Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. · Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed. · Information security protects the integrity and privacy of data, both in storage and in transit.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Sr.No Question A Answe
A valid definition of digital evidence is: Data stored or Information of Digital data of Any digital evidence
transmitted using aprobative value probative value on a computer
computer
What are the three general categories of computer Desktop, laptop, Personal computer,Hardware, software, |Open computer
D
systems that can contain digital evidence? server Internet, mobile networks syystems,
talanhana- cammunicatian
In terms of digital evidence, a hard drive is an example |Open computer Communication Embedded INone of the above
3 A
of: Systems Systems computer systems

|In terms of digital evidence, a mobile telephone is an Open computer Communication Embedded None of the above
example of: Systems systems computer systems
In termsof digital evidence, a Smart Card is an open computer Lommunication Embedded None of the above
example of: systems systems Computer systems

In terms of digital evidence, the Internet is an example |Open computer Communication Embedded None of the above
B
OI: systems systems computer systems
Computers can be involved in which of the following|Homicide and sexual Computer intrusions| Civil disputes All of the above

|types of crime? assault and intellectual D
property theft

|A logon record tells us that, at a specific time: An unknown personThe owner of a The account was None of the above
logged into the specific account used to log into the
system using the logged into the system
account system
|Cybertrails are advantageous because: They are not Nobody can be They are easy to Offenders who are
connected to the harmed by crime on |follow. unaware of them
physical world the Internet. |leave behind more
clues than they D
otherwise would
have.




https:
//githu
b.com
/saura
Private networks can be a richer source of evidence vhath
They retain data for |Owners of privatePrivate networks All of the above.
than the Internet because: i/lpu-c
longer periods of networks are more contain a higher
10 time. cooperative with
|law enforcement.
concentration of
digital evidence. se
Due to caseload and budget constraints, often Each unreported Responsibility forThis approach Computer security
computer security professionals attempt to limit the incident robs incident resolution|results in under- professionals
attorneys and law frequently does not reporting of criminalldevelop loose
|damage and close each investigation as quickly as
possible. Which of the following is NOT a significant enforcement reside with the activity, deflating evidence processing
drawback to this approach? personnel of an security statistics that are habits
opportunity to learn |professional, but used to allocate that can make it
about the basics of with management. corporate and more difticult for B
computer-related |government law enforcement
crime. spending on personnel and
combating computer attorneys to
related crime. prosecute an
offender.

Locard's Exchange Differential Beccaria's Social INone of the above
The criminological principle which states that, when Principle |Association TheoryContract
12 anyone, or anything, enters a crime scene he/she takes A

something of the scene with him/her, and leaves
something of himself/herself behind, is:
The author of a series of threatening e-mails An individual An incidental A
class An indeterminate
13 consistently uses "im" instead of "I'm." This is an characteristic characteristic characteristic characteristic A

example of:
Criminal Prosecution Defense work |All of the above
Personal computers and networks are often a valuable investigation
4 D
source of evidence. Those involved with. should
|be comfortable with this technology
An argument for including computer forensic trainingIt provides an It provides them |It teaches them None of the above.
computer security specialists is: additional with the tools to when it is time to
15
credential. conduct their own call in law
investigations. enforcement.
Computers can play the following roles in a crime: Target, object, and Evidence, |Object, evidence, Symbol,
subject instrumentality, andtool |instrumentality, and B
contraband, or fruit source of evidence
of crime
about:blank 1/14

, 3/16/23, 9:50 PM Chapter 4 digital evidence




The first US law to address computer crime was: Computer Fraud and|Florida ComputerComputer Abuse Act| None of the above
Abuse Act (CFAA)Crime Act

First responder Forensic examiner Digital investigator All of the above
18
The following specializations exist in digital
linvestigations: (a.k.a. digital crime D
Scene tecnnician)
The first tool for making forensic copies of computer EnCase Expert Witness dd Safeback
storage media was:
|One of the most common approaches to validating Examine the sourceAsk others if the |Compare results ofComputer forensic
Z0 forensic software is to: code software is reliablemultiple tools for tool testing projects
|discrepancies
|An instrumentality of a crime is: An instrument used |A weapon or tool Anything that plays All of the above
1 to commit a crime designed to commit a significant role ina D
a crime crime
|. Contraband can include: Child pornography Devices or programs Encryption devices All of the above
22 for eavesdropping or applications
on communications

A
cloned mobile telephone is an example of Hardware as Hardware as an Information as Information as
contraband or fruits instrumentality contraband or fruitsevidence
of crime ofcrime
Digital photographs or videos of child exploitation is Hardware as Hardware as an |nformation as Information as
Z4 an example of: contraband or fruitsinstrumentality evidence raband or fruits D

of crime of crime
Stolen bank account information is an example of: Hardware as Information as Information as an Information as
25 contraband or fruits |contraband or fruits instrumentality evidence B

of crime of crime_
A network sniffer program is an example of: Hardware as Hardware as an Information as Information as
26 contraband or fruits instrumentality contraband or fruits evidence
of crime of crime
Computer equipment purchased with stolen credit |Hardware as Hardware as an Hardware as Information as
27 card information is an example of: contraband or fruits instrumentality evidence contraband or fruitsA
of crime of crime
A printer used for counterteiting is an example of: |Hardware as Hardware as an Hardware as Information as
28 contraband or fruitsinstrumentality evidence contraband or fruits
of crime of crime
Phone company records
https: are an example of: Hardware as Information as Information as an Information as
29
//githu contraband or fruits contraband or fruits instrumentality evidence

b.com
|of crime |of crime

/saura
vhath
i/lpu-c
se
In the course of conducting
forensic analysis, which of Critical thinking Fusion Validation |All of the above
20 D
the following actions are carried out:
|Having a member of the search team trained to handle |Can reduce the Can serve to Can reduce the All of the above
digital evidence: number of peoplestreamline the opportunity for
31 who handle the presentation of the opposing counsel to D
evidence case impugn the integrity
of the evidence
An attorney asking a digital investigator to find Influencing the Due diligence Quid pro quo Voir dire
32 evidence supporting a particular line of inquiry is an examiner
|example of:
|Logical reasoningCommon sense |Preconceived theory| nvestigators
investigator pursuing a line of investigation in intuition
33
a case because that line of investigation proved
Successtul in two previous cases is an example of:
Balance of Beyond a reasonable|Acquittal None of the above
A scientific truth attempts to identify roles that are probabilities |doubt
34
84
universally true. Legal judgment, on the other hand,
has a standard of proof in criminal prosecutions of:
Regarding the admissibility of evidence, which of the |Relevance Authenticity Best evidence |Nominally
B5 D
following is not a consideration: prejudicial
Uninformed consent| Forcible entry Obtained without None of the above
36 According to the text, the most common mistake that authorization
prevents evidence seized from being admitted is:
|In obtaining a warrant, an investigator must convince vidence of a crime A crime has been Ine owner or The evidence is
the judge on all of the following points except: |IS in existence committed resident of the place likely to exist at the
|




37 |to be searched is place to be searched
|likely to have
committed the
Crime
|If, while searching a computer for evidence of a |Abandon the |Continue with the Stop the search and Continue with the
specific crime, evidence of a new, unrelated crime is original search, andoriginal search but obtain a warrant original search,
38 discovered, the best course of action is: pursue the new linealso pursue the newthat addresses theignoring the new
of investigation nquiry new inquiry information

The process of documenting the seizure of digital Chain of custody Field notes Interim report None of the above
39 evidence and, in particular, when that evidence
changes hands, is known as:
about:blank 2/14

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
10 augustus 2023
Aantal pagina's
13
Geschreven in
2022/2023
Type
College aantekeningen
Docent(en)
Mahesh
Bevat
Alle colleges

Onderwerpen

$8.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
lalit14331

Maak kennis met de verkoper

Seller avatar
lalit14331 lovely professional university
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
4
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen