The establishment of an accreditation of forensic methodologies and examiners is expected to:
A. include both true experts and self-proclaimed experts.
|
|
B. include only investigators, not forensic programmers.
|
|
C. increase the likelihood of successful evidentiary challenges.
|
|
D. increase awareness and extend professionalism.
|
|
A __________ is software that captures every action undertaken by an individual user of a suspect machine.
A. Spy Pro
|
|
B. Keylogger
|
|
C. Wire Recorder
|
|
D. Data Watcher
|
|
What do existing forfeiture statutes mandate?
A. All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
|
|
B. Legitimate money, seized with illegal money, will be returned after deducting a fine.
|
|
C. Legitimate revenue if combined with laundered funds can be seized.
|
|
D. Legitimate revenue cannot be seized under any circumstances
|
|
Which of the following is true of remote data storage?
A. Search warrants for any location of remote data are likely to be ruled constitutional.
|
|
B. Remote data storage aids law enforcement authorities in obtaining incriminating information.
|
|
C. The practice of data stripping impedes the efforts of law enforcement agencies.
|
|
D. The lack of physicality facilitates the identification of the prevailing legal authority.
|
|
The three operational modes of a model law enforcement agency are incident response, __________ management, and prevention
A. event
|
|
B. crisis
|
|
C. data
|
|
D. emergency
|
|
Which of the following is considered one of the limitations of data mining as a popular analysis tool?
A. Data mining is incapable of revealing patterns.
|
|
B. Data mining’s tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
|
|
C. Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
|
|
D. Data mining doesn’t identify causal relationships or strength of connections
|
|
Which of the following statements is true of data mining?
A. Data quality is enhanced by the presence of duplicate records.
|
|
B. Data mining easily differentiates between good and bad data sources.
|
|
C. Data mining readily identifies causal relationships or depth and strength of connections.
|
|
D. Privacy advocates argue that data mining violates various Constitutional rights.
|
|
Legislatures struggling with issues of state sovereignty must ensure that the federal government takes the role of:
A. mediator, not dictator.
|
|
B. dictator, not mediator.
|
|
C. both mediator and dictator.
|
|
D. either mediator or dictator.
|
|
Legislation that mandates accountability of __________ servers should be developed to reduce the number of DOS attacks.
A. SMTP
|
|
B. UNIX
|
|
C. WINDOWS
|
|
D. PASCAL
|
|
Technology has made information __________, thus exponentially increasing its value.
A. illegal
|
|
B. obsolete
|
|
C. actionable
|
|
D. important
|
|
Which of the following statements is considered true regarding the development of computer-specific legislation?
A. It should ensure uniformity in application and interpretation within a selected jurisdiction.
|
|
B. It must be applicable to traditional problems, not to advanced technology.
|
|
C. It must be applicable to tomorrow’s technology, not to traditional problems.
|
|
D. It should ensure uniformity in application and interpretation irrespective of jurisdictional climate
|
|
Which of the following is true regarding the application of wireless communications?
A. It provides a mechanism for phone location, but not data on the cell site.
|
|
B. It presents difficulty in determining jurisdictional boundaries.
|
|
C. FCC regulations discourage service providers from locating phones.
|
|
D. The Supreme Court recognizes the concept of privacy in wireless communications.
|
|
Which of the following practices can be employed to enhance the effectiveness of data mining?
A. Standardization of data appearance
|
|
B. Inclusion of duplicate records
|
|
C. Insertion of anomalous data points
|
|
D. Retention of compromised data fields
|
|
Which of the following is true of establishing accountability for Internet users?
A. Confidentiality should be provided for legitimate users.
|
|
B. Anonymity should be given to users who seek it.
|
|
C. The expectation of privacy in private activities never conflicts with law enforcement interests.
|
|
D. The development of enforcement-friendly legislation is an uncomplicated task.
|
|
Internet downloads, Bluetooth wireless connection, and __________ are the ways by which cell phone viruses are spread via smart phones with connection and data capabilities
A. multimedia answering
|
|
B. browsers
|
|
C. email
|
|
D. Facebook
|
|
Which of the following is true about the standard of accreditation of computer forensics?
A. The standard does not require a universal acceptance.
|
|
B. The standard does not require a mechanism for empirical testing and debate.
|
|
C. The standard requires a rigorous testing by all experts in the field.
|
|
D. The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
|
|
“Know your customer” statutes should require businesses to know the customers:
A. and assure their identity.
|
|
B. but not assure their identity.
|
|
C. and assure their identity only when required.
|
|
D. without necessarily maintaining transparency.
|
|
What is the primary reason for the lack of nomenclature that has hindered the investigation and prosecution of computer-related crime?
A. The emergence of wireless technology
|
|
B. The vast number of viruses and worms unleashed upon the Internet
|
|
C. The reluctance of the Supreme Court to interpret emerging laws
|
|
D. The huge increase in seemingly average individuals who are willing to become first-time criminals
|
|
A __________ is a request for assistance from one country’s judicial authority to that of another country.
A. interrogatory
|
|
B. Ex Post Facto notice
|
|
C. letter rogatory
|
|
D. extradition
|
|
The inclusion of true experts in the development of expertise in forensic methodologies and examiners would result in:
A. increased likelihood of successful evidentiary challenges.
|
|
B. more professionalism in computer investigations.
|
|
C. decreased awareness among the community.
|
|
D. greater utilization of unrecognized methodologies.
|
|