D431 Objectives Boi questions
with verified solutions 2024-2025
Digital Evidence - answer Refers to any data or information stored
or transmitted in digital form, such as files, emails, log records,
metadata, images, videos, etc.
Documentary Evidence - answer Includes physical documents,
records, contracts, receipts, letters, or any printed material that can
be used to provide proof or support a claim in legal proceedings.
Real Evidence - answer AKA physical evidence refers to tangible
objects or materials that are directly related to a crime or event.
Examples include weapons, stolen property, or surveillance footage.
Testimonial Evidence - answer Provided by witnesses or individuals
who offer statements or testimonies about their observations,
knowledge, or experiences related to the case.
Computer Forensics - answer The process of investigating and
analyzing digital evidence to uncover and reconstruct events
related to potential computer crimes or incidents.
It involves collecting, preserving, examining, and presenting digital
data in a legally admissible manner.
Fraud - answer Refers to deceptive or dishonest activities carried
out with the intention of gaining financial or personal benefits
unlawfully.
In the context of computer forensics, it involves investigating and
uncovering evidence related to digital fraud or cybercrimes.
,Chain of Custody - answer Refers to the chronological
documentation and tracking of the physical possession, handling,
and transfer of evidence from the moment it is collected until it is
presented in court.
Maintaining this is essential to ensure the integrity and
admissibility of the evidence.
Describe the GENERAL GUIDELINES for doing computer forensic
work... - answer 1. Chain of custody
2. Minimize interaction with the actual evidence
3. Documentation
4. Secure the evidence
5. Adhere to legal requirements
DIGITAL EVIDENCE related to Financial Crimes - answer Transaction
records, banking details, online payment receipts, and digital
communications related to financial transactions.
DIGITAL EVIDENCE related to Cyber Harassment or Cyberstalking -
answer Email records, social media messages, online posts, or chat
logs containing harassing or threatening content.
DIGITAL EVIDENCE related to Intellectual Property Theft - answer
Digital files, source code, or design documents that may indicate
unauthorized copying or use of intellectual property.
DIGITAL EVIDENCE related to Data Breach or Hacking - answer Log
files, network traffic records, and malware samples that show
unauthorized access or intrusion attempts.
DIGITAL EVIDENCE related to Identity Theft - answer Digital records
of fraudulent activities, such as unauthorized account access or
falsified identification documents.
, Identity Theft - answer The fraudulent acquisition and use of
someone's personal information, such as social security numbers or
financial details, with the intention of committing crimes or financial
fraud in the victim's name.
Hacking - answer Refers to gaining unauthorized access to computer
systems, networks, or data with the intention of breaching security
measures or stealing information.
Cyberstalking (Harassment) - answer AKA online harassment,
involves using digital communication platforms to repeatedly
harass, threaten, or intimidate an individual.
Denial of Service (DoS) Attack - answer An attempt to make a
computer system or network unavailable to its users by flooding it
with excessive traffic or overwhelming its resources.
Logic Bomb - answer A malicious program or code that remains
dormant until specific conditions or triggers are met.
Once activated, it can execute harmful actions, such as deleting
data or disrupting system operations.
User-Generated Passwords - answer Users create their passwords
based on specific criteria, such as a minimum length or inclusion of
special characters.
Hashed Passwords - answer Operating systems often store
passwords as hashed values, which are one-way cryptographic
representations of the original password.
Salted Hashes - answer To enhance security, systems may use a salt,
a random value combined with the password before hashing, to
prevent precomputed attacks.