Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

In general, hearsay evidence is not admissible in court.

A.

True

B.

False

Computer-generated evidence is never suspect, because of the ease with which it can be altered, usually without a trace.

A.

True

B.

False

If you have no luck identifying a subject on a social network, try adjusting your regional settings and change your location. Sometimes, the user's privacy settings are set to only show their profile to users in the same geographical location.

A.

True

B.

False

Intelligence personnel must never save the search results that satisfy the research objective as it has no bearing on a case.

A.

True

B.

False

In Rosenberg v. Collins, the court held that if the computer output is used in the regular course of business, the evidence shall be admitted.

A.

True

B.

False

What technique can be used totrack cryptocurrency transactionsin cybercrime investigations?

A.

Blockchain analysis

B.

Reverse IP lookup

C.

Dark web forums

D.

Phishing attacks

Please select the most popular types of hackers:

A.

White Hat

B.

Grey Hat

C.

Black Hat

D.

All of the above

The Federal Bureau of Investigation (FBI), United States Secret Service (USSS), Immigration and Customs Enforcement (ICE), and United States Postal Inspector (USPI) are all investigating cyber-related crimes.

A.

True

B.

False

You do not need a subpoena to request user information from Facebook.

A.

True

B.

False

ICE has been taking a heavy stance and prosecuting Organized Retail Crime (ORC).

A.

True

B.

False