& ANSWERS 100% CORRECT!!
Which of the following is true regarding computer forensics? - ANSWERComputer
forensics deals with the process of finding evidence related to a digital crime to find
the culprits and initiate legal action against them.
Which of the following is NOT a objective of computer forensics? -
ANSWERDocument vulnerabilities allowing further loss of intellectual property,
finances, and reputation during an attack.
Which of the following is true regarding Enterprise Theory of Investigation (ETI)? -
ANSWERIt adopts a holistic approach toward any criminal activity as a criminal
operation rather as a single criminal act.
Forensic readiness refers to: - ANSWERAn organization's ability to make optimal
use of digital evidence in a limited time period and with minimal investigation costs.
Which of the following is NOT a element of cybercrime? - ANSWEREvidence smaller
in size.
Which of the following is true of cybercrimes? - ANSWERInvestigators, with a
warrant, have the authority to forcibly seize the computing devices.
Which of the following is true of cybercrimes? - ANSWERThe initial reporting of the
evidence is usually informal.
Which of the following is NOT a consideration during a cybercrime investigation? -
ANSWERValue or cost to the victim.
Which of the following is a user-created source of potential evidence? -
ANSWERAddress book.
Which of the following is a computer-created source of potential evidence? -
ANSWERSwap file.
Which of the following is NOT where potential evidence may be located? -
ANSWERProcessor.
Under which of the following conditions will duplicate evidence NOT suffice? -
ANSWERWhen original evidence is in possession of the originator.
Which of the following Federal Rules of Evidence governs proceedings in the courts
of the United States? - ANSWERRule 101.
Which of the following Federal Rules of Evidence ensures that the truth may be
ascertained and the proceedings justly determined? - ANSWERRule 102.
, Which of the following Federal Rules of Evidence contains rulings on evidence? -
ANSWERRule 103
Which of the following Federal Rules of Evidence states that the court shall restrict
the evidence to its proper scope and instruct the jury accordingly? - ANSWERRule
105
Which of the following refers to a set of methodological procedures and techniques
to identify, gather, preserve, extract, interpret, document, and present evidence from
computing equipment in such a manner that the discovered evidence is acceptable
during a legal and/or administrative proceeding in a court of law? -
ANSWERComputer Forensics.
Computer Forensics deals with the process of finding _____ related to a digital crime
to find the culprits and initiate legal action against them. - ANSWEREvidence.
Minimizing the tangible and intangible losses to the organization or an individual is
considered an essential computer forensics use. - ANSWERTrue.
Cybercrimes can be classified into the following two types of attacks, based on the
line of attack. - ANSWERInternal and External.
Espionage, theft of intellectual property, manipulation of records, and trojan horse
attacks are examples of what? - ANSWERInsider attack or primary attacks.
External attacks occur when there are inadequate information-security policies and
procedures. - ANSWERTrue.
Which type of cases involve disputes between two parties? - ANSWERCivil.
A computer forensic examiner can investigate any crime as long as he or she takes
detailed notes and follows the appropriate processes. - ANSWERFalse.
________ is the standard investigative model used by the FBI when conducting
investigations against major criminal organizations. - ANSWEREnterprise Theory of
Investigation (ETI).
Forensic readiness includes technical and nontechnical actions that maximize an
organization's competence to use digital evidence. - ANSWERTrue.
Which of the following is the process of developing a strategy to address the
occurrence of any security breach in the system or network? - ANSWERIncident
Response.
Digital devices store data about session such as user and type of connection. -
ANSWERTrue.
Codes of ethics are the principles stated to describe the expected behavior of an
investigator while handling a case. Which of the following is NOT a principle that a