IAM Exam 5 Prep Exam with precise detailed ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
solutions
___________________ of ________________ covers all property obtained by criminal acts. - ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
correct answer✔✔fruits; crime||\\//|| ||\\//||
Hashing is used in digital forensics to show that the __________________ of the evidence
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
has not been compromised. - correct answer✔✔integrity
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
The application of science to law is called _______________ science. - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔forensic
Any data stored or transmitted using a computer that can be used to support or refute an
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
offense in law is _____________________ evidence. - correct answer✔✔digital
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
The first computer crime law anywhere was created in ________________ because of false
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
winning dog track tickets. - correct answer✔✔Florida
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
The wiring of all the things, even mundane items like refrigerators, to the Internet is creating
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
the ________________. - correct answer✔✔Internet of Thing
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
The first federal computer crime law was created in the country of ____________________. -
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
correct answer✔✔Canada
||\\//|| ||\\//||
Property not allowed to private citizens is called ________________. - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔contraband
, Something has _______________ if it is used in a significant way in a crime. - correct ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔instrumentality
___________________ ____________________ occurs when improperly obtained evidence is ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
used as the basis for conducting a legitimate case but only the legitimate method is
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
revealed in court. (2 words) - correct answer✔✔Parallel Construction ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Internet evidence that usually reflects a crime in the real world can be uncovered following
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
the _________________ of evidence. - correct answer✔✔cybertrail
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
In the scientific method we either reject or _______________ the hypothesis. - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔fail to reject ||\\//|| ||\\//||
Thinking of a computer used in a crime as being a(n) object, subject, tool or symbol is the
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
basis of ______________ categories. - correct answer✔✔Parker's
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
ISFCE, GIAC and IACIS are all sources or originators of digital forensics __________________.
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
- correct answer✔✔certifications
||\\//|| ||\\//||
Evidence is said to be _________________ when it proves to be suitable for admission of ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
persuadable fact in a court of law. - correct answer✔✔forensic ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
As an outcome of the scientific method we may explain how something occurs (which is a
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
_________________), or why something occurs (which is a __________________). - correct ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔law; theory ||\\//||
Ensuring that evidence is what it claims to be and has probative value is known as ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
_______________ in digital forensics. - correct answer✔✔authentication ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
solutions
___________________ of ________________ covers all property obtained by criminal acts. - ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
correct answer✔✔fruits; crime||\\//|| ||\\//||
Hashing is used in digital forensics to show that the __________________ of the evidence
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
has not been compromised. - correct answer✔✔integrity
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
The application of science to law is called _______________ science. - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔forensic
Any data stored or transmitted using a computer that can be used to support or refute an
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
offense in law is _____________________ evidence. - correct answer✔✔digital
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
The first computer crime law anywhere was created in ________________ because of false
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
winning dog track tickets. - correct answer✔✔Florida
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
The wiring of all the things, even mundane items like refrigerators, to the Internet is creating
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
the ________________. - correct answer✔✔Internet of Thing
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
The first federal computer crime law was created in the country of ____________________. -
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
correct answer✔✔Canada
||\\//|| ||\\//||
Property not allowed to private citizens is called ________________. - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔contraband
, Something has _______________ if it is used in a significant way in a crime. - correct ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔instrumentality
___________________ ____________________ occurs when improperly obtained evidence is ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
used as the basis for conducting a legitimate case but only the legitimate method is
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
revealed in court. (2 words) - correct answer✔✔Parallel Construction ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Internet evidence that usually reflects a crime in the real world can be uncovered following
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
the _________________ of evidence. - correct answer✔✔cybertrail
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
In the scientific method we either reject or _______________ the hypothesis. - correct
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔fail to reject ||\\//|| ||\\//||
Thinking of a computer used in a crime as being a(n) object, subject, tool or symbol is the
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
basis of ______________ categories. - correct answer✔✔Parker's
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
ISFCE, GIAC and IACIS are all sources or originators of digital forensics __________________.
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
- correct answer✔✔certifications
||\\//|| ||\\//||
Evidence is said to be _________________ when it proves to be suitable for admission of ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
persuadable fact in a court of law. - correct answer✔✔forensic ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
As an outcome of the scientific method we may explain how something occurs (which is a
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
_________________), or why something occurs (which is a __________________). - correct ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
answer✔✔law; theory ||\\//||
Ensuring that evidence is what it claims to be and has probative value is known as ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
_______________ in digital forensics. - correct answer✔✔authentication ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||