Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

When computer evidence is being seized, all of the following are priority objectives EXCEPT

A.

isolating the computer

B.

isolating power and phone connections.

C.

checking for physical traps

D.

Checking for CCTV surveillance

Allowing an accounts payable clerk access to the vendor master file so the clerk can add or delete names is a violation of which of the following fraud prevention practices?

A.

Offline entry controls and limits

B.

Separation of duties

C.

Signature authorities

D.

Rotation of duties

What term is given to testimonial evidence presented in court?

A.

Parole

B.

Hearsay

C.

Fact witness

D.

Opinion witness

Anything thateffectively negates or reduces the ability of an adversary to exploit information or vulnerabilities is called:

A.

exposure

B.

risk avoidance

C.

a protection method

D.

a countermeasure

The sealing arrangement and chair spacing of an interview room are dictated by the:

A.

investigator preference and expected length of the Interview.

B.

interviewee preference and office size.

C.

particular investigation and Interview techniques to be used

D.

time it takes to conduct the interview and layout of the room

Latent prints usually refer to:

A.

Impressions used for Identification purposes

B.

impressions that are left only by sweat

C.

Impressions made using Ink

D.

Impressions left at a crime scene

The ultimate test of a good investigative report is that the report:

A.

results in a conviction

B.

is in the first person.

C.

includes a conclusion

D.

docs not cause the reader to have any questions

A "suspense log" should be Kepi as a list of:

A.

set or subject names

B.

evidence obtained

C.

due dates for reports, status checks, and investigative leads

D.

possible scenarios

When a suspect in a computer crime investigation has deleted computer riles, valuable evidence may still exist in the form of erased files. The data associated with these files can be preserved only through a:

A.

cold bootup

B.

hot bootup

C.

black box.

D.

bit stream backup

An anonymous employee contacts the ethics hotline and reports that a co-worker is selling drugs in the office. An investigation is initiated to determine if the allegations are true. What type of investigation is best suitedto obtain the necessary facts?

A.

Constructive investigation

B.

Undercover investigation

C.

Personnel background investigation

D.

Reconstructive investigation