Which of the following is true regarding computer forensics? Correct Answer- Computer forensics deals
with the process of finding evidence related to a
... [Show More] digital crime to find the culprits and initiate legal action
against them.
Which of the following is NOT a objective of computer forensics? Correct Answer- Document
vulnerabilities allowing further loss of intellectual property, finances, and reputation during an attack.
Which of the following is true regarding Enterprise Theory of Investigation (ETI)? Correct Answer- It
adopts a holistic approach toward any criminal activity as a criminal operation rather as a single criminal
act.
Forensic readiness refers to: Correct Answer- An organization's ability to make optimal use of digital
evidence in a limited time period and with minimal investigation costs.
Which of the following is NOT a element of cybercrime? Correct Answer- Evidence smaller in size.
Which of the following is true of cybercrimes? Correct Answer- Investigators, with a warrant, have the
authority to forcibly seize the computing devices.
Which of the following is true of cybercrimes? Correct Answer- The initial reporting of the evidence is
usually informal.
Which of the following is NOT a consideration during a cybercrime investigation? Correct Answer- Value
or cost to the victim.
Which of the following is a user-created source of potential evidence? Correct Answer- Address book.
Which of the following is a computer-created source of potential evidence? Correct Answer- Swap file.
Which of the following is NOT where potential evidence may be located? Correct Answer- Processor.
Under which of the following conditions will duplicate evidence NOT suffice? Correct Answer- When
original evidence is in possession of the originator.
Which of the following Federal Rules of Evidence governs proceedings in the courts of the United
States? Correct Answer- Rule 101.
Which of the following Federal Rules of Evidence ensures that the truth may be ascertained and the
proceedings justly determined? Correct Answer- Rule 102.
Which of the following Federal Rules of Evidence contains rulings on evidence? Correct Answer- Rule
103
Which of the following Federal Rules of Evidence states that the court shall restrict the evidence to its
proper scope and instruct the jury accordingly? Correct Answer- Rule 105
Which of the following refers to a set of methodological procedures and techniques to identify, gather,
preserve, extract, interpret, document, and present evidence from computing equipment in such a
manner that the discovered evidence is acceptable during a legal and/or administrative proceeding in a
court of law? Correct Answer- Computer Forensics.
Computer Forensics deals with the process of finding _____ related to a digital crime to find the culprits
and initiate legal action against them. Correct Answer- Evidence.
Minimizing the tangible and intangible losses to the organization or an individual is considered an
essential computer forensics use. Correct Answer- True.
Cybercrimes can be classified into the following two types of attacks, based on the line of attack. Correct
Answer- Internal and External. [Show Less]