Chapter 15 Computer Forensics and Investigations

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Which of the following is not considered a potential source of digital evidence?

A. Internet of Things (IoT) device

B. Mobile phone

C. Faxed document

D. Network router

C. Faxed Document

2
New cards

___________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Network analysis

3
New cards

Which of the following is best described as "whenever two objects come in contact, a transfer of material occurs"?

A. Fruit of the poisonous tree doctrine

B. Locard's exchange principle

C. The Daubert test

d. Plain view doctrine

B. Locards exchange principle

4
New cards

What are CCE, CCFE, CFCE, and GCFA examples of?

Computer forensics certifications

5
New cards

What is a test for measuring the reliability of a scientific methodology?

Daubert

6
New cards

During which step of a computer crime investigation is the crime scene typically documented?

Preservation

7
New cards

What is a forensic duplicate image?

A bit-by-bit copy of the original storage media

8
New cards

Which of the following cannot be examined on a forensic duplicate image?

A. Volatile data cache

B. File download history

C. Internet browsing history

D. Instant message or internet chat logs

D. Instant message or internet chat logs

9
New cards

A computer or any electronic device can play one of four roles in computer crime. Cyberstalking and phishing scams are examples of which role?

To facilitate a crime

10
New cards

Alice is a computer forensic examiner. She is at a crime scene and finds a computer that must be taken into evidence. She tags the computer, notes that a network cable was attached, and removes the computer from the scene. At which step of the investigative process is Alice most likely working?

Collection

11
New cards

All of the following statements are true except:

A. to be admissible, evidence must be collected in a lawful manner.

B. a judge or jury can consider only admissible evidence when they decide cases.

C. forensic examiners must use established practices and procedures when collecting evidence.

D. all evidence is admissible as long as it is reproducible in a tangible form.

D. all evidence is admissible as long as it is reproducible in a tangible form.

12
New cards

During which step of a computer crime investigation is expert witness testimony taken?

Presentation

13
New cards

A judge or jury can consider only __________ evidence when deciding cases.

admissible

14
New cards

Why can non-probative evidence be excluded from trial?

Because it is not relevant

15
New cards

At the federal level, what is the name of the main guidance regarding how parties introduce evidence at trial?

Federal Rules of Evidence

16
New cards

Which of the following prevents the government from using illegally gathered evidence at a criminal trial?

A. Fruit of the poisonous tree doctrine

B. Locard's exchange principle

C. The Daubert test

D. Probative evidence

A. Fruit of the poisonous tree doctrine

17
New cards

What does the best evidence rule require?

That original documents be used at trial

18
New cards

Which of the following is not an exception to the Fourth Amendment's requirements for search warrants?

A. Consent

B. Plain view doctrine

C. Interference

D. Exigent circumstances

C. Interface

19
New cards

Which of the following is true of the Pen Register and Trap and Trace Statute?

A. No one is allowed to install wiretaps on telephones to intercept telephonic communications.

B. A court order is required to use pen register or trap and trace devices to intercept electronic communications transmission data.

C. No one may access the contents of stored communications unless it is allowed somewhere else in the statute.

D. This law applies to communications content.

B. A court order is required to use pen register or trap and trace devices to intercept electronic communications

20
New cards

A(n) _______ happens when a person's reasonable expectation of privacy in a place or thing is compromised. A(n) ______ happens when the government interferes with a person's property.

search, seizure

21
New cards

True or False? Computer forensics is the scientific process for examining data stored on, received from, or transmitted by electronic devices.

True

22
New cards

True or False? During the identification phase of an investigation, computer forensic examiners learn about the crime, event, or activity being investigated.

True

23
New cards

True or False? During the collection step of an investigative process, computer forensic examiners secure the crime scene and any electronic devices and ensure no one tampers with or modifies evidence.

False

24
New cards

True or False? The examination step of an investigative process is sometimes referred to as the "bag and tag" step.

False

25
New cards

True or False? The chain of custody shows who obtained evidence, where and when it was obtained, who secured it, and who had control or possession of it.

True

26
New cards

True or False? A forensic duplicate image is generally made by the forensic examiner during the preservation step of the investigative process.

False

27
New cards

True or False? The test for measuring the reliability of a scientific methodology in computer forensic investigations is called the Daubert test.

True

28
New cards

True or False? A reasonable Daubert test question is: "Is there a known error rate for the tool?"

True

29
New cards

True or False? Regarding forensic investigations, all rules and processes apply equally to both law enforcement and private entities.

False

30
New cards

True or False? A search warrant is a court order, and probable cause is a burden of proof.

True

31
New cards

True or False? The Fourth Amendment protects people from unreasonable government search and seizure.

True

32
New cards

True or False? Probable cause occurs when a person's reasonable expectation of privacy in a place or thing is compromised.

False

33
New cards

True or False? To get a search warrant, law enforcement must clearly specify the criminal activity that is being investigated.

True

34
New cards

True or False? A warrant is always required to use "silver platter" evidence in court.

False

35
New cards

True or False? The exception that allows law enforcement to make a warrantless search in order to protect their safety and to ensure that evidence is not destroyed during an arrest is known as the protective sweep exception.

True

36
New cards

True or False? A court-recognized exception to the Fourth Amendment's search warrant requirements is exigent circumstances, under which law enforcement does not need a warrant to search for weapons or contraband on the body of an arrested person.

False

37
New cards

True or False? Relevance of evidence can occasionally be a problem for digital evidence because it is sometimes hard for judges and juries to understand very technical information.

True

38
New cards

True or False? In a search incident to a lawful arrest, law enforcement is required to have a warrant to search for weapons or contraband on the body of an arrested person.

False

39
New cards

True or False? Law enforcement may conduct inventory searches without a warrant when they arrest a suspect. These searches are allowed when they are made for non-investigative purposes.

True

40
New cards

True or False? Records recovered from a computer can be hearsay, depending on how they were created originally.

True

Explore top flashcards