1. Which of the following is true regarding computer forensics?: Computer forensics deals with the process of finding evidence related to a digital crime
... [Show More] to find the culprits and initiate legal action against them.
2. Which of the following is NOT a objective of computer forensics?: Doc- ument vulnerabilities allowing further loss of intellectual property, finances, and reputation during an attack.
3. Which of the following is true regarding Enterprise Theory of Investigation (ETI)?: It adopts a holistic approach toward any criminal activity as a criminal operation rather as a single criminal act.
4. Forensic readiness refers to:: An organization's ability to make optimal use of digital evidence in a limited time period and with minimal investigation costs.
5. Which of the following is NOT a element of cybercrime?: Evidence smaller in size.
6. Which of the following is true of cybercrimes?: Investigators, with a warrant, have the authority to forcibly seize the computing devices.
7. Which of the following is true of cybercrimes?: The initial reporting of the evidence is usually informal.
8. Which of the following is NOT a consideration during a cybercrime inves- tigation?: Value or cost to the victim.
9. Which of the following is a user-created source of potential evidence?: -
Address book.
10. Which of the following is a computer-created source of potential evi- dence?: Swap file.
11. Which of the following is NOT where potential evidence may be located?-
: Processor.
12. Under which of the following conditions will duplicate evidence NOT suffice?: When original evidence is in possession of the originator.
13. Which of the following Federal Rules of Evidence governs proceedings in the courts of the United States?: Rule 101.
14. Which of the following Federal Rules of Evidence ensures that the truth may be ascertained and the proceedings justly determined?: Rule 102.
15. Which of the following Federal Rules of Evidence contains rulings on evidence?: Rule 103
16. Which of the following Federal Rules of Evidence states that the court shall restrict the evidence to its proper scope and instruct the jury accord- ingly?: Rule 105
17. Which of the following refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment in such a manner that the discovered evidence is acceptable during a legal and/or administrative proceeding in a court of law?: Computer Forensics.
18. Computer Forensics deals with the process of finding related to a digital crime to find the culprits and initiate legal action against them.: Evi- dence.
19. Minimizing the tangible and intangible losses to the organization or an individual is considered an essential computer forensics use.: True.
20. Cyb [Show Less]