ログイン

cyber mid2

cyber mid2
18問 • 1年前
  • AGANON JUSTINE C.
  • 通報

    問題一覧

  • 1

    Is a volatile and fragile and it can be modified by the incorrect evidence

    DIGITAL EVIDENCE

  • 2

    Cases is collected before collecting digital data

    IDENTIFICATION

  • 3

    collecting evidence from the place inside a digital system

    ACQUISITION

  • 4

    Is used to keep track of the names and locations of files loacated on a storage

    LOGICAL EXTRACTION

  • 5

    Data aims to safeguard digital evidence from alteration

    PRESERVATION

  • 6

    Who recorded the documents

    CHAIN OF CUSTODY

  • 7

    The examination amd interpretation of digital evidence

    ANALYSIS PHASE

  • 8

    The communication of the findings of the analysis

    REPORTING PHASE

  • 9

    This attempts to use time to create a timeline

    TIME FRAME ANALYSIS

  • 10

    This is used to identify the person who created, accessed or modified data on a computer device

    OWNERSHIP AND POSSESION ANALYSIS

  • 11

    This is to analyze applications and a files on a computer system

    APPLICATION AND FILE ANALYSIS

  • 12

    Secret data may reveal knowledge of a crime possesion of records

    DATA HIDING ANALYSIS

  • 13

    The subscribers information traffic data or related his or her possesion or control

    WDCD- WARRANT OF THE DISCLOSURE OF COMPUTER DATA

  • 14

    Allows the law enforcement to listen, log , trace messages

    WICD= WARRANT OF THE INTERCEPTION OF COMPUTER DATA

  • 15

    The proposal may also provide an overview of the searcg and seizure

    WSSECD= WARRANT TO SEARCH, SEIZE AND EXAMINE COMPUTER DATA

  • 16

    Such as warantless has already confiscated a computer data system

    WECD= WARRANT TO EXAMINE COMPUTER DATA

  • 17

    Before filing of return

    LAW ENFORCEMENT

  • 18

    After filing of return

    COURT

  • agencies involved

    agencies involved

    AGANON JUSTINE C. · 12問 · 2年前

    agencies involved

    agencies involved

    12問 • 2年前
    AGANON JUSTINE C.

    R1

    R1

    AGANON JUSTINE C. · 22問 · 2年前

    R1

    R1

    22問 • 2年前
    AGANON JUSTINE C.

    P.i quiz

    P.i quiz

    AGANON JUSTINE C. · 51問 · 2年前

    P.i quiz

    P.i quiz

    51問 • 2年前
    AGANON JUSTINE C.

    Non- insti

    Non- insti

    AGANON JUSTINE C. · 47問 · 2年前

    Non- insti

    Non- insti

    47問 • 2年前
    AGANON JUSTINE C.

    Research 1 reviewer premlims

    Research 1 reviewer premlims

    AGANON JUSTINE C. · 62問 · 2年前

    Research 1 reviewer premlims

    Research 1 reviewer premlims

    62問 • 2年前
    AGANON JUSTINE C.

    LEA 3 PRELIMS

    LEA 3 PRELIMS

    AGANON JUSTINE C. · 62問 · 2年前

    LEA 3 PRELIMS

    LEA 3 PRELIMS

    62問 • 2年前
    AGANON JUSTINE C.

    Evidence

    Evidence

    AGANON JUSTINE C. · 20問 · 1年前

    Evidence

    Evidence

    20問 • 1年前
    AGANON JUSTINE C.

    Lea 3 midterm quiz

    Lea 3 midterm quiz

    AGANON JUSTINE C. · 45問 · 1年前

    Lea 3 midterm quiz

    Lea 3 midterm quiz

    45問 • 1年前
    AGANON JUSTINE C.

    Arson midterm quiz 2

    Arson midterm quiz 2

    AGANON JUSTINE C. · 34問 · 1年前

    Arson midterm quiz 2

    Arson midterm quiz 2

    34問 • 1年前
    AGANON JUSTINE C.

    drugs

    drugs

    AGANON JUSTINE C. · 29問 · 1年前

    drugs

    drugs

    29問 • 1年前
    AGANON JUSTINE C.

    drugs1

    drugs1

    AGANON JUSTINE C. · 74問 · 1年前

    drugs1

    drugs1

    74問 • 1年前
    AGANON JUSTINE C.

    drugs 2

    drugs 2

    AGANON JUSTINE C. · 18問 · 1年前

    drugs 2

    drugs 2

    18問 • 1年前
    AGANON JUSTINE C.

    ballistic

    ballistic

    AGANON JUSTINE C. · 54問 · 1年前

    ballistic

    ballistic

    54問 • 1年前
    AGANON JUSTINE C.

    cyber

    cyber

    AGANON JUSTINE C. · 32問 · 1年前

    cyber

    cyber

    32問 • 1年前
    AGANON JUSTINE C.

    quizzzbali

    quizzzbali

    AGANON JUSTINE C. · 29問 · 1年前

    quizzzbali

    quizzzbali

    29問 • 1年前
    AGANON JUSTINE C.

    Drugs mq1

    Drugs mq1

    AGANON JUSTINE C. · 21問 · 1年前

    Drugs mq1

    Drugs mq1

    21問 • 1年前
    AGANON JUSTINE C.

    Balistics q5

    Balistics q5

    AGANON JUSTINE C. · 10問 · 1年前

    Balistics q5

    Balistics q5

    10問 • 1年前
    AGANON JUSTINE C.

    cyber mid 2

    cyber mid 2

    AGANON JUSTINE C. · 27問 · 1年前

    cyber mid 2

    cyber mid 2

    27問 • 1年前
    AGANON JUSTINE C.

    cflm mud 2

    cflm mud 2

    AGANON JUSTINE C. · 29問 · 1年前

    cflm mud 2

    cflm mud 2

    29問 • 1年前
    AGANON JUSTINE C.

    lea 3 quiz 1

    lea 3 quiz 1

    AGANON JUSTINE C. · 33問 · 1年前

    lea 3 quiz 1

    lea 3 quiz 1

    33問 • 1年前
    AGANON JUSTINE C.

    lea 3 quiz 1

    lea 3 quiz 1

    AGANON JUSTINE C. · 33問 · 1年前

    lea 3 quiz 1

    lea 3 quiz 1

    33問 • 1年前
    AGANON JUSTINE C.

    Arson 1st quiz prelims

    Arson 1st quiz prelims

    AGANON JUSTINE C. · 58問 · 1年前

    Arson 1st quiz prelims

    Arson 1st quiz prelims

    58問 • 1年前
    AGANON JUSTINE C.

    mapping

    mapping

    AGANON JUSTINE C. · 31問 · 1年前

    mapping

    mapping

    31問 • 1年前
    AGANON JUSTINE C.

    Lei PQ1

    Lei PQ1

    AGANON JUSTINE C. · 40問 · 1年前

    Lei PQ1

    Lei PQ1

    40問 • 1年前
    AGANON JUSTINE C.

    Lea 3 pq2

    Lea 3 pq2

    AGANON JUSTINE C. · 5問 · 1年前

    Lea 3 pq2

    Lea 3 pq2

    5問 • 1年前
    AGANON JUSTINE C.

    Lie PQ2

    Lie PQ2

    AGANON JUSTINE C. · 52問 · 1年前

    Lie PQ2

    Lie PQ2

    52問 • 1年前
    AGANON JUSTINE C.

    Lea3 pq3

    Lea3 pq3

    AGANON JUSTINE C. · 23問 · 1年前

    Lea3 pq3

    Lea3 pq3

    23問 • 1年前
    AGANON JUSTINE C.

    問題一覧

  • 1

    Is a volatile and fragile and it can be modified by the incorrect evidence

    DIGITAL EVIDENCE

  • 2

    Cases is collected before collecting digital data

    IDENTIFICATION

  • 3

    collecting evidence from the place inside a digital system

    ACQUISITION

  • 4

    Is used to keep track of the names and locations of files loacated on a storage

    LOGICAL EXTRACTION

  • 5

    Data aims to safeguard digital evidence from alteration

    PRESERVATION

  • 6

    Who recorded the documents

    CHAIN OF CUSTODY

  • 7

    The examination amd interpretation of digital evidence

    ANALYSIS PHASE

  • 8

    The communication of the findings of the analysis

    REPORTING PHASE

  • 9

    This attempts to use time to create a timeline

    TIME FRAME ANALYSIS

  • 10

    This is used to identify the person who created, accessed or modified data on a computer device

    OWNERSHIP AND POSSESION ANALYSIS

  • 11

    This is to analyze applications and a files on a computer system

    APPLICATION AND FILE ANALYSIS

  • 12

    Secret data may reveal knowledge of a crime possesion of records

    DATA HIDING ANALYSIS

  • 13

    The subscribers information traffic data or related his or her possesion or control

    WDCD- WARRANT OF THE DISCLOSURE OF COMPUTER DATA

  • 14

    Allows the law enforcement to listen, log , trace messages

    WICD= WARRANT OF THE INTERCEPTION OF COMPUTER DATA

  • 15

    The proposal may also provide an overview of the searcg and seizure

    WSSECD= WARRANT TO SEARCH, SEIZE AND EXAMINE COMPUTER DATA

  • 16

    Such as warantless has already confiscated a computer data system

    WECD= WARRANT TO EXAMINE COMPUTER DATA

  • 17

    Before filing of return

    LAW ENFORCEMENT

  • 18

    After filing of return

    COURT