- (Topic 3)
You are working as a computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact local law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject computer. You inform the officer that you will not be able to comply with thatnetwork sniffer on your network and monitor all
traffic to the subject? computer. You inform the officer that you will not be able to comply with that request because doing so would:
Correct Answer:
C
- (Topic 1)
Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?
Correct Answer:
D
- (Topic 1)
First responder is a person who arrives first at the crime scene and accesses the victim's computer system after the incident. He or She is responsible for protecting, integrating, and preserving the evidence obtained from the crime scene. Which of the following is not a role of first responder?
Correct Answer:
D
- (Topic 1)
Damaged portions of a disk on which no read/Write operation can be performed is known as ____ .
Correct Answer:
B
- (Topic 1)
A forensic investigator is a person who handles the complete Investigation process, that is, the preservation, identification, extraction, and documentation of the evidence. The investigator has many roles and responsibilities relating to the cybercrime analysis. The role of the forensic investigator is to:
Correct Answer:
C