The chain of custody must document the following: the _____ of any evidence
Question 1 As long as the _____________ is maintained, an investigator can prove that the log files has not been altered or modified since its capture.
Question 2 ___________ is a record of the seizure, custody, control, transfer, analysis, and disposition of physical and electronic device.
Question 3 The chain of custody must document the following: the _____ of any evidence, when evidence was ______ , the ______ who provided the evidence, the _________ to gain the evidence, the ____________ the evidence, and the evidence ________ .
Question 4 A _____________ form should include the conditions under which the evidence was collected, who actually handled the evidence, the time of collection, the durating of custody, the security conditions while the evidence was handled and stored, and how the evidence was transferred.
Question 5 __________ is an e-mail fraud method in which the perpetrator sends out official-looking e-mail to the possible victims, pretending to be from their ISP, bank, or retail establishment, to collect personal and financial information.
Question _____________ is a crime where a person’s identity is stolen.
Question 7 In ______________– , attackers illegally use another’s credit card for purchasing good and other services over the Internet.
Question 8 ______________ is an offense under the cyber laws.
Question 9 ________________- is all about collecting information such as client lists to perpetrate frauds and scams in order to affect a rival financially.
Question ________________ is any work that focuses on children in a sexual manner.
Question 11 _______________ is the application of scientific and legally sound methods for the investigation of Internet crimes, whose focus ranges from an individual system to the Internet at large.
Question 12 The ______________- application should describe clearly that the investigators are to perform an on-site examination of the computer and network devices.
Question 13 The warrant needs to permit the seizure of all devices suspected to have been used in the crime, including the following: ___________, webcam, ____________, and other network device.
Question 14 __________ should perform forensic examinations on all equipment permitted in the search warrant.
Question 15___________ is the entity that oversees global IP address allocation, DNS root zone management, media types, and other Internet protocol assignments.
Question 16 __________is a valuable tool for querying DNS information for host name resolution.
Question 17 The ___________ utility displays the path IP packets travel between two systems.
Question 18 __________ is a graphical tool that determines where and how virtual traffic is flowing on the route between the desired destination and the location from which the user is trying to access it.
Question 19 A search warrant application should include the proper language to perform on-site _________ of the suspect’s computer and the e-mail server used to sent the e-mails under investigation.
Question 20 _________ can seize e-mail accounts by just changing the existing password of the e-mail account either by asking the suspect his or her password or from the mail server.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
