Digital forensics

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is an example of a compressed file?

.zip

Place the following steps for analyzing digital evidence in the correct order.

1 Collection, 2 Examination, 3, Analysis, 4 Reports

Order

1, CPU, cache and register content, 2 Routing table, ARP cache, 3 Process table and kernel statistics, 4 Memory, 5 Temporary file systems, 6 Data on hard drive, 7 Remotely logged data, 8 Data contained on archival media

Which of the following is NOT an example of malware?

A fake bank website used to obtain account information

Creating, producing, using or selling counterfeit devices used to charge credit cards without authorization

Access Device Fraud Statute

Which of the following is NOT current legislation on digital crime?

Anti-Cyber Bullying and Stalking Statute

A business sends out promotional emails without giving an option to opt-out. Which of the following legislation is the business violating?

CAN-SPAM Act

What does the CAN-SPAM Act regulate?

Commercial email

Knowingly accessing a protected computer without authorization with the intention to defraud, obtain anything of value or cause damage

Computer Fraud & Abuse Act

Aid in documenting evidence

Digital forensic platforms

Simplify searching for files and recovering deleted files

File viewing tools

After receiving an e-mail promising a free cruise, Amari sent the company $75 in taxes for port crossing, but never heard back from the company about arranging his free cruise. Which of the following best describes this digital crime?

Fraud

Deception for financial or personal gain

Fraud

Gaining unauthorized access to a device

Hacking

Knowingly creating, transferring or possessing false identification documents

Identity Theft Statute

Which of the following is NOT criminalized by the Computer Fraud and Abuse Act?

Knowingly creating, transferring or possessing false identification documents

Recover information from mobile devices and allow data to be extracted to a PC

Mobile device tools

In United States vs. David, 1991, what actions were determined to be a violation of David's 4th Amendment rights?

Only search

Used to bypass passwords on a system

Password crackers

Li's credit card information was stolen after inputting her account information in a fake website. Which of the following best describes this digital crime?

Phishing

Obtaining sensitive information such as usernames, passwords and credit card information by masquerading as a trusted site

Phishing

Which of the following is the best description of digital forensics?

Science of collecting and analyzing information from information and communication technologies as evidence in a legal case

Falsifying data in order to appear as a different person or program

Spoofing

Computer hard drives and flash drives are examples of which of the following?

Storage devices

Which of the following would be a situation in which a warrant may NOT need to be used to seize digital evidence?

The information was shared on public social media

According to the segment, why is isolating the device from any networks important?

To prevent remote access

Intentionally accessing a server which provides electronic communication to obtain or alter any electronic communication

Unlawful Access to Stored Communication Act

Julie hacks into her employer's e-mail server in order to send private information in emails about the state of the company to a competitor. Which of the following legislation is she violating?

Unlawful Access to Stored Communications Act

Which of the following is NOT criteria which should be used to locate evidence?

Use of device

Intentionally intercepting or disclosing any wire, oral electronic communication using a device where the involved parties have expectation of privacy

WireTap Act

The Children's Online Privacy Protection Rule regulates websites which are targeting children in which age group?

Younger than 13 years

Which of the following is an example of information and communication technology?

cell phone

Digital evidence search and seizure is regulated by the 24th Amendment.

false

Mark whether the following statements are true or false. Password-protected computers are typically considered "open containers".

false

Direct evidence is

is based on fact or records of an event.

If a victim experiences a crime in a place where the action was illegal, but the perpetrator committed the action in a country where the action is not illegal, then there is very little which can be done to prosecute the crime.

true


Kaugnay na mga set ng pag-aaral

Chapter 42- Stress and Adaptation

View Set

Part 01: You Make the Decision: Introduction to Management

View Set

Chapter 1: End of Chapter Practice Quiz

View Set