Which of the following is NOT a member of the Crime Scene Investigation team?
b. Judge
What is Hacktivism?
a. assist in work and entertainment
b. hacking to promote a political cause
c. not a crime
d. damage or destroying information
b. hacking to promote a political cause
a. AFIS
b. CODIS
c. NIBIN
d. FISH
d. FISH
The documented and unbroken transfer of evidence is known as ____.
B. Chain of Custody
Locard's Exchange principle implies all of the following except:
a. Fibers can be transferred from one person to another.
b.Blood spatter is used to identify blood type.
c. Cat hair can be transferred to your pants.
d. Soil samples can be carried from the yard into your home
B. Blood spatter is used to identify blood type
Which statement is TRUE about collecting evidence at a crime scene?
a. It is NOT used to determine whether a crime has been committed
b. it can only be used to link a suspect with the crime scene
c. no special procedures need to be followed to prevent contamination
d. the evidence is further analyzed at a laboratory
d. the evidence is further analyzed at a laboratory
What is Phishing?
a. messages from someone you know
b. messages designed to trick you
c. redirecting messages
d. hijacked messages
b. messages designed to trick you
Questioned documents include all of the following EXCEPT:
a. checks
b. wills
c. passports
d. voter registration
d. voter registration
The reason that it is important to separate witnesses at a crime scene is to:
c. Prevent the witnesses from talking to one another
Which standard sets the precedence regarding the acceptance of an individual as an expert witness?
a. Frye Standard
b. Daubert Standard
c. Mariana Standard
b. Daubert Standard
While taking pictures at the crime scene, it is important to:
a. Take pictures from far away. Getting too close might contaminate the crime scene.
b. Use a ruler to provide evidence of scale (size).
c. Only observe the pictures in black and white.
d. All of these are true.
b. Use a ruler to provide evidence of scale (size).
What is a white hat hacker?
a. hacker who prevents future hacking
b. a malicious hacker with intent
c. an illegal hacker but with not malicious intent
a. hacker who prevents future hacking
An exemplar is:
a. A sample of handwriting of a known origin and standard document taken from a suspect
b. a sample from a suspected sexual assault
c. a comparison to a piece of trace evidence recovered from a crime scene
d. a fingerprint sample
a. A sample of handwriting of a known origin and standard document taken from a suspect
A crime-scene sketch should include all of the following except:
D. The type of search pattern that was used
The term "Forensics" literally translates to ________________________.
a. legal files
b. scientific law
c. of or belonging to the forum
d. criminal investigation
c. of or belonging to the forum
Which of the following best describes the difference between circumstantial evidence and direct evidence?
d. Direct evidence proves and alleged fact, while circumstantial evidence is used to imply a fact.
What is a Trojan Horse?
a. the repeated use of electronic communications
b. fraudulent acquisition and use of a person's private identity
c. computer virus delivered a piece of code
d. a program designed to breach the security of a computer system
d. a program designed to breach the security of a computer system
A process used by criminals to make, alter, or falsify a person’s signature or a document with the intent to deceive another person is called :
a. fraud
b. counterfeit
c. forgery
d. alteration
c. forgery
What are the 4 types of search patterns?
a. grid, round, line/strip, zone
b. spiral, round, line/strip, quadrant
c. spiral, grid, quadrant, no pattern
d. spiral, grid, line/strip, quadrant
d. spiral, grid, line/strip, quadrant
Which of the following agencies does NOT maintain its own crime lab?
a. The US Postal Service
b. The FBI
c. US Fish and Wildlife Service
d. CIA
d. CIA
What is the acronym the first responding officer to the crime scene must always use?
a. FISH
b. ADAPT
c. CODIS
d. SEAS
b. ADAPT
Which is true about testing counterfeit currency?
a. an iodine pen turns bluish-black when in contact with starch in the counterfeit paper
b. an iodine pen turns red in the presence of starch in the counterfeit paper
a. an iodine pen turns bluish-black when in contact with starch in the counterfeit paper
Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute or uncertain is known as an:
a. questioned document
b. exemplar
c. counterfeit
d. forgery
a. questioned document
Small amounts of trace evidence can be packed in what's called a "druggist fold." This packing paper is known as a/an_________________.
a. bundle
b. envelope
c. bindle
d. papel
c. bindle
Any and all objects that can establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator are considered:
a. material evidence
b. circumstantial evidence
c. physical evidence
d. transient evidence
c. physical evidence