fill in the blank on the questions

Part 1 – – 0/20 Answered Questions, 100.0 Points

1. As long as the ____ is maintained, an investigator can prove that the log files has not been altered or modified since its capture. (5.0 Points)

2. ____ is a record of the seizure, custody, control, transfer, analysis, and disposition of physical and electronic device. (5.0 Points)

3. The chain of custody must document the following: the ____ of any evidence, when evidence was ____, the ____ who provided the evidence, the ____ to gain the evidence, the ____ the evidence, and the evidence ____. (5.0 Points)

4. A ____ form should include the conditions under which the evidence was collected, who actually handled the evidence, the time of collection, the durating of custody, the security conditions while the evidence was handled and stored, and how the evidence was transferred. (5.0 Points)

5. ____ is an e-mail fraud method in which the perpetrator sends out official-looking e-mail to the possible victims, pretending to be from their ISP, bank, or retail establishment, to collect personal and financial information. (5.0 Points)

6. ____ is a crime where a person’s identity is stolen. (5.0 Points)

7. In ____, attackers illegally use another’s credit card for purchasing good and other services over the Internet. (5.0 Points)

8. ____ is an offense under the cyber laws. (5.0 Points)

9. ____ is all about collecting information such as client lists to perpetrate frauds and scams in order to affect a rival financially. (5.0 Points)

unanswered question0. ____ is any work that focuses on children in a sexual manner. (5.0 Points)

11. ____ is the application of scientific and legally sound methods for the investigation of Internet crimes, whose focus ranges from an individual system to the Internet at large. (5.0 Points)

12. The ____ application should describe clearly that the investigators are to perform an on-site examination of the computer and network devices. (5.0 Points)

13. The warrant needs to permit the seizure of all devices suspected to have been used in the crime, including the following: ____, ____, webcam, ____, and other network device. (5.0 Points)

14. ____ should perform forensic examinations on all equipment permitted in the search warrant. (5.0 Points)

15. ____ is the entity that oversees global IP address allocation, DNS root zone management, media types, and other Internet protocol assignments. (5.0 Points)

16. ____ is a valuable tool for querying DNS information for host name resolution. (5.0 Points)

17. The ____ utility displays the path IP packets travel between two systems. (5.0 Points)

18. ____ is a graphical tool that determines where and how virtual traffic is flowing on the route between the desired destination and the location from which the user is trying to access it. (5.0 Points)

19. A search warrant application should include the proper language to perform on-site ____ of the suspect’s computer and the e-mail server used to sent the e-mails under investigation. (5.0 Points)

20. ____ can seize e-mail accounts by just changing the existing password of the e-mail account either by asking the suspect his or her password or from the mail server. (5.0 Points)

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.