Professional Documents
Culture Documents
Midterm Test 1 - Attempt Review (Page 2 of 4)
Midterm Test 1 - Attempt Review (Page 2 of 4)
Question 29 You are collecting electronic evidence at the crime scene. What should the collection proceed?
Complete
Mark 1.00 out Select one:
of 1.00
a. The collection should proceed from the most volatile to the least volatile.
Flag
question
b. The collection should proceed only from physical memory.
c. The collection should proceed only from hard disk.
d. The collection should proceed from the least volatile to the most volatile.
Question 31 Computer forensics report provides detailed information on complete computer forensics
Complete investigation process. Which of the following attributes of a forensics report can render it in admissible
Mark 1.00 out in a court of law?
of 1.00
Question 32
The Federal Bureau of Investigation (FBI) set up a laboratory in order to provide forensic services to all
Complete eld agents and other law authorities.
Mark 1.00 out
of 1.00 Select one:
Flag a. 1972
question
b. 1932
c. 1992
d. 1952
Question 33 There were massive backlogs within all police forces, to the point where it was six months to two years
Complete before some computers could be examined.
Mark 1.00 out
of 1.00 Select one:
Flag a. Information copyright security
question
b. Forensics Backlog
c. Chain of custody
d. Biometric information security
Question 35 What is the role of the Forensic Examiner in the Judicial System?
Complete
Mark 1.00 out Select one:
of 1.00
a. Must be expert witness and without bias.
Flag
question
b. Develops standards for forensics.
c. Hurting the expert & freeing the client .
d. Understand their goals.
Question 36 What does the American Society of Crime Laboratory Directors/Laboratory Accreditation Board
Complete (ASCLD/LAB) do?
Mark 1.00 out
of 1.00 Select one:
Flag a. Write documents for various agencies after collection
question
b. Computer Forensic Tool Testing
c. They set standards and requirements for accreditation
d. Publish on the Internet with GPS location metadata
Question 38 Which of the following Steganography techniques allows you to encode information that ensures
Complete creation of cover for secret communication?
Mark 1.00 out
of 1.00 Select one:
Flag a. Transform domain techniques
question
b. Cover generation techniques
c. Substitution techniques
d. Spread spectrum techniques
PREVIOUS ACTIVITY
Announcements
Jump to...