Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
Very few cyber crime cases are resolved prior to trial through pretrial motion or plea bargain |
False |
|
Cybercrime investigator only needs to wait for the prosecutor to discuss the case |
False |
|
Most of the defense attorney's cross examination of the investigator will be based upon the investigator's report |
True |
|
Cyber crime investigators can request any information from the law enforcement officers |
False |
|
Time zone information is always required to be specific while collecting online evidence |
True |
|
dynamic ip address is permanently assigned to devices configured to always have the same ip address |
false |
|
email messages, data files, and stored programs can be obtained from the internet service provider |
true |
|
all hardware and media should be seized during the on-scene investigation |
false |
|
before transporting laptops from the crime scene it is unnesccessary to remove all the batteries |
false |
|
cyber crime prevention annual plan includes the individual project information |
true |
|
which of the following info cannot be obtained by the commercial software or public website such as www.network-tools.com? |
A. make and model of the web server b. ip address c. domain name registration info d. domain name |
|
which of the following statements is incorrect? |
A.Warrant, court orders, or subpoenas are typically required to release exact end user information from the ISP to law enforcement B.IP address and the date/time/time zone information should be specified to request a search warrant while tracing an IP address or domain name CTransactional information (connection times, dates, IP address used) cannot be obtained from the ISP DThe requirements of search warrant is governed by the Electronic Communication Privacy Act (ECPA) |
|
which of the following is not required while conducting investigation at the cyber crime scene? |
a. digital media identification b. disassemble physical devices c. prioritize the physical media d. seize the storage and media |
|
which of the following statements is correct? |
A.When transporting storage devices, it is unnecessary to always keep the devices away from strong magnetic fields B. We do not need to shut down the laptop before transporting it C.If a computer has floppy drive, leaving oneunformattedfloppy disk in the drive may prevent an accident boot to the hard drive D.Noneof the above |
|
which of the following is not the potential evidence collected from the peripheral devices? |
A.Email messages B.Recently scanned, faxed, or printed documents C.Incoming and outgoing phone D.Information about the purpose for or use of the device |
|
which of the following is not a duty of the law enforcement officers? |
A. Understanding corporate concerns B.Easing tensions between the public and private sectors C.Protecting confidential and privileged information D.Holding a press conference for the case |