• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back

Very few cyber crime cases are resolved prior to trial through pretrial motion or plea bargain

False

Cybercrime investigator only needs to wait for the prosecutor to discuss the case

False

Most of the defense attorney's cross examination of the investigator will be based upon the investigator's report

True

Cyber crime investigators can request any information from the law enforcement officers

False

Time zone information is always required to be specific while collecting online evidence

True

dynamic ip address is permanently assigned to devices configured to always have the same ip address

false

email messages, data files, and stored programs can be obtained from the internet service provider

true

all hardware and media should be seized during the on-scene investigation

false

before transporting laptops from the crime scene it is unnesccessary to remove all the batteries

false

cyber crime prevention annual plan includes the individual project information

true

which of the following info cannot be obtained by the commercial software or public website such as www.network-tools.com?

A. make and model of the web server


b. ip address


c. domain name registration info


d. domain name

which of the following statements is incorrect?

A.Warrant, court orders, or subpoenas are typically required to release exact end user information from the ISP to law enforcement


B.IP address and the date/time/time zone information should be specified to request a search warrant while tracing an IP address or domain name


CTransactional information (connection times, dates, IP address used) cannot be obtained from the ISP


DThe requirements of search warrant is governed by the Electronic Communication Privacy Act (ECPA)

which of the following is not required while conducting investigation at the cyber crime scene?

a. digital media identification


b. disassemble physical devices


c. prioritize the physical media


d. seize the storage and media

which of the following statements is correct?

A.When transporting storage devices, it is unnecessary to always keep the devices away from strong magnetic fields


B. We do not need to shut down the laptop before transporting it


C.If a computer has floppy drive, leaving oneunformattedfloppy disk in the drive may prevent an accident boot to the hard drive


D.Noneof the above

which of the following is not the potential evidence collected from the peripheral devices?

A.Email messages


B.Recently scanned, faxed, or printed documents


C.Incoming and outgoing phone


D.Information about the purpose for or use of the device

which of the following is not a duty of the law enforcement officers?

A. Understanding corporate concerns


B.Easing tensions between the public and private sectors


C.Protecting confidential and privileged information


D.Holding a press conference for the case