exam2(2) - Question 1 How can a user fake their IP address?...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Question 1 2 out of 2 points How can a user fake their IP address? Correct Answer: Through Spoofing. Feedback : correct Question 2 2 out of 2 points When the physical evidence can be specifically and unequivocally linked to a particular object or person, then the investigators have achieved: Correct Answer: forensic identification. Feedback : correct Question 3 2 out of 2 points Forensic science can be described as: Correct Answer: the application of science to legal matters. Feedback : correct Question 4 2 out of 2 points How does Cache Storage work inside of a computer? Correct Answer: It is a group of temporary files that the computer uses to help swap data from the RAM.into the mass storage area. Feedback : correct Question 5 0 out of 2 points What type of information should a forensic accountant keep in their log of activities when dealing with computers? Selected Answer: all of the above. Correct Answer: names, dates, times, and computer serial numbers. Feedback : incorrect Question 6 2 out of 2 points Which of the following does a Criminalist do? Correct Answer: All of the above. Feedback : correct Question 7 2 out of 2 points
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
In which of the following types of crimes can computer forensics be used? Correct Answer: all of the above. Feedback : correct Question 8 2 out of 2 points Why is a chain of custody important to maintain? Correct Answer: So that both the prosecution and defense can be assured that no one tampered with the.evidence. Feedback : correct Question 9 2 out of 2 points What is biometrics? Correct Answer: Identifying persons by physical characteristics. Feedback : correct Question 10 2 out of 2 points To establish forensic identification, the points of comparison for the suspect must Correct Answer: Uniquely correspond with those of the person who committed the crime. Feedback : correct Question 11 2 out of 2 points Which of the following do forensic scientists typically rely upon to solve crimes? Correct Answer: All of the above. Feedback : correct Question 12 2 out of 2 points What does a packet sniffer do? Correct Answer: It copies certain types of data packets and stores them for later use. Feedback
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/08/2008 for the course ACC 418 taught by Professor Turner during the Winter '07 term at Cal Poly Pomona.

Page1 / 8

exam2(2) - Question 1 How can a user fake their IP address?...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online