
CHFI v9 Module 1
Authored by Karen Diggs
Computers
University
Used 26+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
When retrieving evidence from a particular electronic device, investigators need not worry about unlawful search and seizure according to Fourth Amendment laws.
True
False
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
In the Enterprise Theory of Investigation (ETI) you can view criminal acts as more than isolated crimes.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many types of Cybercrime investigations are there?
4
2
3
Many
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This principle refers to the fact that when you enter a crime scene you both take something with you and leave something behind.
Exchange Principle
Locard's Exchange Principle
Cybercrime Principle
Evidence Principle
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many types of cybercrime are there?
3
2
5
Many
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Non-volatile data changes when a system is shut down or unable to power up.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.
Network Forensics
Data Recovery
Disaster Recovery
Computer Forensics
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?