Question

2. The Maryland State Police Guidelines for Seizing Computers states that officer safety is first and...

2. The Maryland State Police Guidelines for Seizing Computers states that officer safety is first and foremost. Do not make assumptions as to the passiveness of the suspect.

True or False

5. Which of the following is not an objective of a computer forensic investigation?

MULTIPLE CHOICE

a. To identify the perpetrator(s) of a crime or other type of malfeasance.

b. To locate and recover data relating to a crime or civil matter.

c. To reconstruct damaged databases and files.

d. All of the above could be objectives of a computer forensic investigation.

8. To which of the following is forensic science applied? Select the BEST answer. Law enforcement matters.

MULTIPLE CHOICE

a. court cases

b. legal matters

c. arrests and laboratories

9. Which of the following is true?

MULTIPLE CHOICE

a. The Locard exchange principle is the principle that says “every contact leaves a trace”.

b. In forensic identification, the Locard exchange principle is used to connect suspects to evidence.

c. Both are true.

d. Both are false.

11. Per article How Computer Forensics Works is the following statement true or false?

The plain view doctrine gives detectives the authority to gather any evidence that is in the open while conducting a search. If the detective in our example saw evidence of a crime on the screen of the suspect's desktop PC, then the detective could use that as evidence against the suspect and search the PC even though it wasn't covered in the original warrant. If the PC wasn't turned on, then the detective would have no authority to search it and would have to leave it alone.

True or False

Homework Answers

Answer #1

Question:- 2. The Maryland State Police Guidelines for Seizing Computers states that officer safety is first and foremost. Do not make assumptions as to the passiveness of the suspect.

Answer:- True

Reason:- The police guidelines clearly indicate that the safety of individuals and staff is of utmost significance and officers should always be ready for any kind of attack from the suspect.

Question:- 5. Which of the following is not an objective of a computer forensic investigation?

Answer:- All of the above could be objectives of a computer forensic investigation

Reason:- computer forensic investigation can be used to reconstruct the deleted files and database, recovering the data or to find out the partners in crime

Question:- To which of the following is forensic science applied? Select the BEST answer. Law enforcement matters.

Answer:- Legal matters

Reason:- forensic science is applied in any kind of legal matters rather than being limited to the court cases or law enforcement

Question:- 9. Which of the following is true?

Answer:- c. Both are true.

Reason:- Locard exchange principle indicates that “every contact leaves a trace”. And it is mainly related to the forensic identification and it mainly occurs when the physical evidence can be related to a certain individual or object.

Question:- Per article How Computer Forensics Works is the following statement true or false?

The plain view doctrine gives detectives the authority to gather any evidence that is in the open while conducting a search. If the detective in our example saw evidence of a crime on the screen of the suspect's desktop PC, then the detective could use that as evidence against the suspect and search the PC even though it wasn't covered in the original warrant. If the PC wasn't turned on, then the detective would have no authority to search it and would have to leave it alone.

Answer:- True

Reason:- if the computer is turned off, then investigating officer cannot turn it on for the collection of evidence. But if it is turned on, then evidence can be collected.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions