Digital forensics
Which of the following is an example of a compressed file?
.zip
Place the following steps for analyzing digital evidence in the correct order.
1 Collection, 2 Examination, 3, Analysis, 4 Reports
Order
1, CPU, cache and register content, 2 Routing table, ARP cache, 3 Process table and kernel statistics, 4 Memory, 5 Temporary file systems, 6 Data on hard drive, 7 Remotely logged data, 8 Data contained on archival media
Which of the following is NOT an example of malware?
A fake bank website used to obtain account information
Creating, producing, using or selling counterfeit devices used to charge credit cards without authorization
Access Device Fraud Statute
Which of the following is NOT current legislation on digital crime?
Anti-Cyber Bullying and Stalking Statute
A business sends out promotional emails without giving an option to opt-out. Which of the following legislation is the business violating?
CAN-SPAM Act
What does the CAN-SPAM Act regulate?
Commercial email
Knowingly accessing a protected computer without authorization with the intention to defraud, obtain anything of value or cause damage
Computer Fraud & Abuse Act
Aid in documenting evidence
Digital forensic platforms
Simplify searching for files and recovering deleted files
File viewing tools
After receiving an e-mail promising a free cruise, Amari sent the company $75 in taxes for port crossing, but never heard back from the company about arranging his free cruise. Which of the following best describes this digital crime?
Fraud
Deception for financial or personal gain
Fraud
Gaining unauthorized access to a device
Hacking
Knowingly creating, transferring or possessing false identification documents
Identity Theft Statute
Which of the following is NOT criminalized by the Computer Fraud and Abuse Act?
Knowingly creating, transferring or possessing false identification documents
Recover information from mobile devices and allow data to be extracted to a PC
Mobile device tools
In United States vs. David, 1991, what actions were determined to be a violation of David's 4th Amendment rights?
Only search
Used to bypass passwords on a system
Password crackers
Li's credit card information was stolen after inputting her account information in a fake website. Which of the following best describes this digital crime?
Phishing
Obtaining sensitive information such as usernames, passwords and credit card information by masquerading as a trusted site
Phishing
Which of the following is the best description of digital forensics?
Science of collecting and analyzing information from information and communication technologies as evidence in a legal case
Falsifying data in order to appear as a different person or program
Spoofing
Computer hard drives and flash drives are examples of which of the following?
Storage devices
Which of the following would be a situation in which a warrant may NOT need to be used to seize digital evidence?
The information was shared on public social media
According to the segment, why is isolating the device from any networks important?
To prevent remote access
Intentionally accessing a server which provides electronic communication to obtain or alter any electronic communication
Unlawful Access to Stored Communication Act
Julie hacks into her employer's e-mail server in order to send private information in emails about the state of the company to a competitor. Which of the following legislation is she violating?
Unlawful Access to Stored Communications Act
Which of the following is NOT criteria which should be used to locate evidence?
Use of device
Intentionally intercepting or disclosing any wire, oral electronic communication using a device where the involved parties have expectation of privacy
WireTap Act
The Children's Online Privacy Protection Rule regulates websites which are targeting children in which age group?
Younger than 13 years
Which of the following is an example of information and communication technology?
cell phone
Digital evidence search and seizure is regulated by the 24th Amendment.
false
Mark whether the following statements are true or false. Password-protected computers are typically considered "open containers".
false
Direct evidence is
is based on fact or records of an event.
If a victim experiences a crime in a place where the action was illegal, but the perpetrator committed the action in a country where the action is not illegal, then there is very little which can be done to prosecute the crime.
true