The Distributed Network Attach Tool is used by computer forensic specialists to _____.

Responses

replace a hard drive that has crashed
replace a hard drive that has crashed

identify fraudulent bank and accounting records on a computer
identify fraudulent bank and accounting records on a computer

find data on a CD-ROM drive
find data on a CD-ROM drive

monitor potential hacking carried out over the Internet

9 answers

The Distributed Network Attach Tool is used by computer forensic specialists to monitor potential hacking carried out over the Internet.

Protocol at a crime-scene investigation and during the investigation of a computer _____.

Responses

must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court
must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court

must have every piece of data studied in files with current dates and updated tags
must have every piece of data studied in files with current dates and updated tags

have little in common
have little in common

must follow different guidelines and protocol

Protocol at a crime-scene investigation and during the investigation of a computer must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court.

he _____ is the more advanced stage of computer forensics which now utilizes a structured protocol of evidence collection.

Responses

latent phase
latent phase

ad-hoc phase
ad-hoc phase

enterprise phase
enterprise phase

structured phase
structured phase

The enterprise phase is the more advanced stage of computer forensics which now utilizes a structured protocol of evidence collection.

Computer crime first appeared in the _____.

Responses

1980s
1980s

1960s
1960s

1970s
1970s

1990s
1990s

Computer crime first appeared in the 1970s.

The primary goal of a forensic computer investigator is to _____.

Responses

catch the criminal
catch the criminal

keep the crime from happening again
keep the crime from happening again

present accurate, admissible evidence to the court
present accurate, admissible evidence to the court

get all the information back
get all the information back

The primary goal of a forensic computer investigator is to present accurate, admissible evidence to the court.