7-0 check your knowledge Flashcards

1
Q

Which of the following describes how law enforcement used the 1986 Stored Communications Act before internet service providers started storing their data on foreign servers? Select one.

A

Law enforcement would receive the data after a lawfully issued warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or false: Technology companies are often the gatekeepers of all electronic data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an implication for law enforcement of our increasingly interconnected digital world? Select one.

A

Loss of evidence, because obtaining data stored overseas can be slow, and that data could be lost or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is hiring civilian staff to support criminal investigations a challenge? Select one.

A

It can be hard to justify spending resources on non-sworn personnel and ensure consistent funding for the positions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a technology that could reshape investigations in the future? Select one.

A

Machine Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some agencies doing to keep pace with changes in computer-based crime? Select one.

A

Spreading expertise around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false: There are several options for free or reduced-cost training in digital forensics that state and local police agencies can pursue.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why can it be hard for police agencies to retain specialized civilian staff and sworn investigators? Select one.

A

There is higher pay in the private sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: The internet introduced an opportunity to commit crime at a distance.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following describes a common goal of phishing schemes? Select one

A

To get access to personal information for the purpose of committing fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly