OSINT Quiz Questions All with
100% Correct Verified Solutions
Electronic Communications Privacy Act (EPCA) - Answer The _______ was enacted in
1986 and is composed of three acts: the Wiretap Act, the Stored Communications Act
(SCA), and the Pen Register Act.
1. Wiretap Act
2. Stored Communications Act (SCA)
3. Pen Register Act. - Answer The Electronic Communications Privacy Act (EPCA)
was enacted in 1986 and is composed of three acts:
Children's Online Privacy Protection Act (COPPA) - Answer ________ and the FTC's
implementing regulations prohibit covered operators from collecting or using
"personal information" from children under the age of thirteen without first obtaining
parental consent.
USA PATRIOT Act - Answer In 2001 the ________ (formally, the Uniting and
Strengthening America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorism Act of 2001) granted federal police agencies the authority to
search the business records of individuals it suspected of involvement in terrorism,
including their library records.
,legally - Answer Agencies must create a machine that is only ____ secure but also
operationally protected from hackers.
standalone - Answer The computer must be _____ and must not be networked with
another computer in any way. In and of itself, this network issue can raise considerable
discussion among investigators. However, the fewer people who have contact with the
potential evidence on the undercover hard drive, the better. This leaves fewer "smoke
and mirror" arguments from defense attorneys.
drive trays - Answer The computer should have removable ______. This permits the
investigator to remove and lock up a particular drive when it is not in use.
open - Answer Online investigators should work in an office that is not _____ to
pedestrian traffic from coworkers or visitors. This type of work can be very
demanding, requiring concentration and minimal distractions.
Search By Image - Answer What Firefox addon would you use for searching images?
end-all - Answer Firefox addon tools are not the _____ You will constantly need to find
new tools and resources as they change daily
Firefox Containers - Answer What Firefox addon would you use for separating out
sock puppet accounts into their own instance?
User Agent - Answer What Firefox addon would you use to view a website with
a different user agent?
,searching - Answer Legally, in the US, there are no court rules, statutes, or laws that
specifically prevent you from _____ a subject's social networking profile, However,
there are laws against direct contact with a subject who is represented by counsel.
direct contact - Answer Legally, in the US, there are no court rules, statutes, or laws that
specifically prevent you from searching a subject's social networking profile, However,
there are laws against _______ with a subject who is represented by counsel.
represented by counsel - Answer Legally, in the US, there are no court rules, statutes,
or laws that specifically prevent you from searching a subject's social networking
profile, However, there are laws against direct contact with a subject who is _______.
A. Investigating complaints
B. Learning about complainants
C. Learning about witnesses - Answer How might you use social media as
an investigative tool?
mundane - Answer People frequently post information on these sites about _____
aspects of their lives that they would probably not share with someone during a verbal
conversation.
Deception - Answer is relevant when examining social media services
inconsistencies - Answer Frequently when someone is lying, an investigator will be
able to identify ______ in the timeline, the
circumstances surrounding key events, or other areas within the questioning.
circumstances - Answer Frequently when someone is lying, an investigator will be
able to identify inconsistencies in the timeline, the
, _______ surrounding key events, or other areas within the questioning.
breadth and depth - Answer Based on a person's job, geographic location, age, etc.,
investigators should have a basic idea of the ______ of information that such a
person should know.
the truth - Answer Inconsistencies in actions or words do not necessarily indicate a
lie, just as consistency is not necessarily a guarantee of the _____. However, a pattern
of inconsistencies or unexplainable behavior normally indicates deceit.
Inconsistencies - Answer _____ in actions or words do not necessarily indicate a lie, just
as consistency is not necessarily a guarantee of the truth. However, a pattern
of inconsistencies or unexplainable behavior normally indicates deceit.
deceit - Answer Inconsistencies in actions or words do not necessarily indicate a lie,
just as consistency is not necessarily a guarantee of the truth. However, a pattern of
inconsistencies or unexplainable behavior normally indicates _______.
unexplainable behavior - Answer Inconsistencies in actions or words do not necessarily
indicate a lie, just as consistency is not necessarily a guarantee of the truth. However,
a pattern of inconsistencies or _________ normally indicates deceit.
backtrack - Answer Always copy URL addresses because sometimes you can't ______
URL addresses - Answer Always copy _______ because sometimes you can't backtrack
Deception - Answer is defined as a deliberate act with the intent to mislead others while
the recipients are not made aware or expect that such an act is taking place and that
the goal of the deceiver is to transfer that false belief to the deceived ones.