Search Header Logo

ITE 384 - Computer Forensics Quiz

Authored by Randell Ty

others

University

Used 5+ times

ITE 384 - Computer Forensics Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

John is suspected of corporate espionage. During the investigation, his work emails are accessed as potential evidence. However, some of these emails contain personal and sensitive information unrelated to the case. Which of the following ethical and legal considerations should be taken into account?

Data Privacy Act
Data Protection Laws
Confidentiality
All of the above
Search with a warranty

2.

MULTIPLE CHOICE QUESTION

1 min • Ungraded

Choose your block

Block 1
Block 5

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A suspect's laptop is seized during a cybercrime investigation. The laptop's hard drive is encrypted, and the suspect refuses to provide the decryption key, citing their right to privacy. Which of the following legal challenges should be considered in compelling the suspect to provide the decryption key while respecting their rights?

Data Protection Laws
Data Privacy Act
Right to Privacy
All of the above
Right to refuse

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

During a criminal case, the prosecution introduces posts from the defendant's social media accounts as evidence of their involvement. However, the defense argues that the posts were taken out of context and do not accurately reflect the defendant's intent. Which of the following legal considerations should be taken into account when using social media posts as evidence?

Authenticity of the Posts
Context Accuracy
Privacy Rights
All of the above
Data Privacy Act

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is it essential to have policies and guidelines in cyber forensics?

To hinder investigations
To ensure the use of hacking techniques
To address ethical challenges and standardize practices
To promote cybercrimes
All of the above

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What role does the Anti-Cybercrime Group (ACG) play in the Philippines?

Digital evidence analysis
Implementing the Data Privacy Act
Enforcing the Cybercrime Prevention Act
Managing the National Privacy Commission
All of the above

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are some of the general principles outlined by the Data Privacy Act for the lawful processing of personal information?

Privacy, innovation, proportionality
Complete disclosure, unlimited purpose, secrecy
Transparency, legitimate purpose, proportionality
Openness, unlimited purpose, fairness
All of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?