Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

cuestion Completion Status: QUESTION 1 What legal authority can law enforcement use? (Choose all that apply) a. Subpoena b. Plain View c. Search Warrant d.

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
cuestion Completion Status: QUESTION 1 What legal authority can law enforcement use? (Choose all that apply) a. Subpoena b. Plain View c. Search Warrant d. Consent QUESTION 2 What information can you obtain from an ISP if using a subpoena? Screen names, real names, home addresses, billing addresses, session times and durations, Media Access Control (MAC) addresses and content of one email related to subscriber. b. Screen names, real names, home addresses, billing addresses, session times and durations and Media Access Control (MAC) addresses Screen names, real names, home addresses, billing addresses, session times and durations, Media Access Control (MAC) addresses and content of all emails. Screen names, real names, home addresses, billing addresses, session times and durations. Media Access Control (MAC) addresses and d.content of some emails. O QUESTION 3 Plain view is the legal authority to search an item that wasn't written in the warrant. True False QUESTION 4 Which guideline (rule) for evidence handling is correct? a. Chain of custody forms doesn't have to be applied to all evidence. b. All actions in processing the evidence should never be documented. C. The process of collecting digital evidence should not alter or raise questions about its integrity. d. Analysis should be done on the original evidence. QUESTION 5 Which is a procedure (action) for evidence handling? a. Document and secure only the specific location of the evidence found b. Package and transport only important evidence securely Make sure Legal authority exists to seize evidence. d. Recognize, identify, seize, and secure some of the evidence at the scene, I JULUS. What is a hash? a. Is used to ensure programs load correctly. b. A variable key-size stream cipher with byte-oriented operations. The algorithm is based on the use of a random permutation. C. A one-way function that compiles streams of data into a message digest of 128, 160 or 256 bits depending on hash function. d. Checks the correctness of a program. QUESTION 7 What are hashes are used for? a. File verification b. To reverse engineer changes from one file to another. c. Cryptographic Hashes (Fingerprinting) d. Patches and updates QUESTIONS Regardless of the size of the source, an MD5 hash value will always be 128 bits True False QUESTION 9 Which of the following can be used as hash sets? O a. Operating System Files. O b. Hacking utilities c. Viruses/Malware O d. Filter specific data sets to include or exclude. QUESTION 10 If you wanted to check for the owner of a website.which utility would you use? a. Whois b.DHCP c. WhoThis d. Finger

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Practical Pension Scheme Accounting

Authors: Shona Harvie, Joanne Scriven, Phil Spary

2nd Edition

1526508974, 9781526508973

More Books

Students also viewed these Accounting questions