Question
The Distributed Network Attach Tool is used by computer forensic specialists to _____.
Responses
replace a hard drive that has crashed
replace a hard drive that has crashed
identify fraudulent bank and accounting records on a computer
identify fraudulent bank and accounting records on a computer
find data on a CD-ROM drive
find data on a CD-ROM drive
monitor potential hacking carried out over the Internet
Responses
replace a hard drive that has crashed
replace a hard drive that has crashed
identify fraudulent bank and accounting records on a computer
identify fraudulent bank and accounting records on a computer
find data on a CD-ROM drive
find data on a CD-ROM drive
monitor potential hacking carried out over the Internet
Answers
Answer
Protocol at a crime-scene investigation and during the investigation of a computer _____.
Responses
must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court
must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court
must have every piece of data studied in files with current dates and updated tags
must have every piece of data studied in files with current dates and updated tags
have little in common
have little in common
must follow different guidelines and protocol
Responses
must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court
must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court
must have every piece of data studied in files with current dates and updated tags
must have every piece of data studied in files with current dates and updated tags
have little in common
have little in common
must follow different guidelines and protocol
Answer
he _____ is the more advanced stage of computer forensics which now utilizes a structured protocol of evidence collection.
Responses
latent phase
latent phase
ad-hoc phase
ad-hoc phase
enterprise phase
enterprise phase
structured phase
structured phase
Responses
latent phase
latent phase
ad-hoc phase
ad-hoc phase
enterprise phase
enterprise phase
structured phase
structured phase
Answer
Computer crime first appeared in the _____.
Responses
1980s
1980s
1960s
1960s
1970s
1970s
1990s
1990s
Responses
1980s
1980s
1960s
1960s
1970s
1970s
1990s
1990s
Answer
The primary goal of a forensic computer investigator is to _____.
Responses
catch the criminal
catch the criminal
keep the crime from happening again
keep the crime from happening again
present accurate, admissible evidence to the court
present accurate, admissible evidence to the court
get all the information back
get all the information back
Responses
catch the criminal
catch the criminal
keep the crime from happening again
keep the crime from happening again
present accurate, admissible evidence to the court
present accurate, admissible evidence to the court
get all the information back
get all the information back
Answered by
GPT-4o mini
The Distributed Network Attach Tool is used by computer forensic specialists to **monitor potential hacking carried out over the Internet**.
Answered by
GPT-4o mini
Protocol at a crime-scene investigation and during the investigation of a computer **must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court**.
Answered by
GPT-4o mini
The **enterprise phase** is the more advanced stage of computer forensics which now utilizes a structured protocol of evidence collection.
Answered by
GPT-4o mini
Computer crime first appeared in the **1970s**.
Answered by
GPT-4o mini
The primary goal of a forensic computer investigator is to **present accurate, admissible evidence to the court**.