Search Header Logo

CHFI v9 Module 1

Authored by Karen Diggs

Computers

University

Used 26+ times

CHFI v9 Module 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When retrieving evidence from a particular electronic device, investigators need not worry about unlawful search and seizure according to Fourth Amendment laws.

True

False

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

In the Enterprise Theory of Investigation (ETI) you can view criminal acts as more than isolated crimes.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many types of Cybercrime investigations are there?

4

2

3

Many

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This principle refers to the fact that when you enter a crime scene you both take something with you and leave something behind.

Exchange Principle

Locard's Exchange Principle

Cybercrime Principle

Evidence Principle

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many types of cybercrime are there?

3

2

5

Many

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Non-volatile data changes when a system is shut down or unable to power up.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

Network Forensics

Data Recovery

Disaster Recovery

Computer Forensics

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?