2. The Maryland State Police Guidelines for Seizing Computers states that officer safety is first and foremost. Do not make assumptions as to the passiveness of the suspect.
True or False
5. Which of the following is not an objective of a computer forensic investigation?
MULTIPLE CHOICE
a. To identify the perpetrator(s) of a crime or other type of malfeasance. |
||
b. To locate and recover data relating to a crime or civil matter. |
||
c. To reconstruct damaged databases and files. |
||
d. All of the above could be objectives of a computer forensic investigation. |
8. To which of the following is forensic science applied? Select the BEST answer. Law enforcement matters.
MULTIPLE CHOICE |
||
a. court cases b. legal matters c. arrests and laboratories |
||
9. Which of the following is true?
MULTIPLE CHOICE
a. The Locard exchange principle is the principle that says “every contact leaves a trace”. |
||
b. In forensic identification, the Locard exchange principle is used to connect suspects to evidence. |
||
c. Both are true. |
||
d. Both are false. |
11. Per article How Computer Forensics Works is the following statement true or false?
The plain view doctrine gives detectives the authority to gather any evidence that is in the open while conducting a search. If the detective in our example saw evidence of a crime on the screen of the suspect's desktop PC, then the detective could use that as evidence against the suspect and search the PC even though it wasn't covered in the original warrant. If the PC wasn't turned on, then the detective would have no authority to search it and would have to leave it alone.
True or False
Question:- 2. The Maryland State Police Guidelines for Seizing Computers states that officer safety is first and foremost. Do not make assumptions as to the passiveness of the suspect.
Answer:- True
Reason:- The police guidelines clearly indicate that the safety of individuals and staff is of utmost significance and officers should always be ready for any kind of attack from the suspect.
Question:- 5. Which of the following is not an objective of a computer forensic investigation?
Answer:- All of the above could be objectives of a computer forensic investigation
Reason:- computer forensic investigation can be used to reconstruct the deleted files and database, recovering the data or to find out the partners in crime
Question:- To which of the following is forensic science applied? Select the BEST answer. Law enforcement matters.
Answer:- Legal matters
Reason:- forensic science is applied in any kind of legal matters rather than being limited to the court cases or law enforcement
Question:- 9. Which of the following is true?
Answer:- c. Both are true.
Reason:- Locard exchange principle indicates that “every contact leaves a trace”. And it is mainly related to the forensic identification and it mainly occurs when the physical evidence can be related to a certain individual or object.
Question:- Per article How Computer Forensics Works is the following statement true or false?
The plain view doctrine gives detectives the authority to gather any evidence that is in the open while conducting a search. If the detective in our example saw evidence of a crime on the screen of the suspect's desktop PC, then the detective could use that as evidence against the suspect and search the PC even though it wasn't covered in the original warrant. If the PC wasn't turned on, then the detective would have no authority to search it and would have to leave it alone.
Answer:- True
Reason:- if the computer is turned off, then investigating officer cannot turn it on for the collection of evidence. But if it is turned on, then evidence can be collected.
Get Answers For Free
Most questions answered within 1 hours.