CSIA-135 Digital Forensics Mindtap
Module One Exam Questions with
Correct Answers
What is the most important role for a forensic examiner during investigations? - Answer-
Interpreting what he or she has actually found
Which corporate crime takes advantage of trust relationships to overbill clients? -
Answer-Embezzlement
When dealing with IT security, which aspect of security deals with protecting against
threats like viruses, Trojans, and intruders? - Answer-Computing security
What is the most common type of attack employed against company networks? -
Answer-Denial-of-service
The Internet fraud scheme is the most common example of which type of computer
crime? - Answer-Financial fraud
Traditionally, what type of attack has been the primary threat to computer systems? -
Answer-Attacks that originate from inside of an organization
Which aspect of organizational security is concerned with training employees in security
awareness? - Answer-Physical Security
Which of the following is NOT one of the main objectives of computer forensics? -
Answer-Analyzing the performance of the network
During any cybercrime investigation, what is the most important factor that forensic
scientists must be aware of? - Answer-The investigation must be conducted in the
proper manner in order to be relied upon in a court of law.
Traditionally, what type of attack has been the primary threat to computer systems? -
Answer-Attacks that originate from inside of an organization
What methodology of investigating criminal activity has become the standard model that
the FBI employs in conducting investigations against major criminal organizations? -
Answer-The Enterprise Theory of Investigation
Module One Exam Questions with
Correct Answers
What is the most important role for a forensic examiner during investigations? - Answer-
Interpreting what he or she has actually found
Which corporate crime takes advantage of trust relationships to overbill clients? -
Answer-Embezzlement
When dealing with IT security, which aspect of security deals with protecting against
threats like viruses, Trojans, and intruders? - Answer-Computing security
What is the most common type of attack employed against company networks? -
Answer-Denial-of-service
The Internet fraud scheme is the most common example of which type of computer
crime? - Answer-Financial fraud
Traditionally, what type of attack has been the primary threat to computer systems? -
Answer-Attacks that originate from inside of an organization
Which aspect of organizational security is concerned with training employees in security
awareness? - Answer-Physical Security
Which of the following is NOT one of the main objectives of computer forensics? -
Answer-Analyzing the performance of the network
During any cybercrime investigation, what is the most important factor that forensic
scientists must be aware of? - Answer-The investigation must be conducted in the
proper manner in order to be relied upon in a court of law.
Traditionally, what type of attack has been the primary threat to computer systems? -
Answer-Attacks that originate from inside of an organization
What methodology of investigating criminal activity has become the standard model that
the FBI employs in conducting investigations against major criminal organizations? -
Answer-The Enterprise Theory of Investigation