CSI Evidence
Cyber
Documents
Crime Collection
Review
100

Which of the following is NOT a member of the Crime Scene Investigation team?

  1. Police officer
  2. Judge
  3. Detective
  4. Medical examiner

b. Judge

100

What is Hacktivism?

a. assist in work and entertainment

b. hacking to promote a political cause

c. not a crime

d. damage or destroying information

b. hacking to promote a political cause

100
What is the database used to compare forgery and counterfeiting in question document cases?

a. AFIS

b. CODIS

c. NIBIN

d. FISH

d. FISH

100

The documented and unbroken transfer of evidence is known as ____.

  1. Locard’s Exchange Principle
  2. Chain of Custody
  3. Frye Standard
  4. Daubert Ruling

B. Chain of Custody

100

Locard's Exchange principle implies all of the following except: 

a. Fibers can be transferred from one person to another.

b.Blood spatter is used to identify blood type.

c. Cat hair can be transferred to your pants.

d. Soil samples can be carried from the yard into your home

B. Blood spatter is used to identify blood type

200

Which statement is TRUE about collecting evidence at a crime scene? 

a. It is NOT used to determine whether a crime has been committed

b. it can only be used to link a suspect with the crime scene

c. no special procedures need to be followed to prevent contamination

d. the evidence is further analyzed at a laboratory

d. the evidence is further analyzed at a laboratory

200

What is Phishing?

a. messages from someone you know

b. messages designed to trick you

c. redirecting messages

d. hijacked messages

b. messages designed to trick you

200

Questioned documents include all of the following EXCEPT:

a. checks

b. wills

c. passports

d. voter registration

d. voter registration

200

The reason that it is important to separate witnesses at a crime scene is to: 

  1. Prevent contamination of the evidence
  2. Prevent fighting among witnesses
  3. Prevent the witnesses from talking to one another
  4. Protect them from the perpetrator.

c. Prevent the witnesses from talking to one another

200

Which standard sets the precedence regarding the acceptance of an individual as an expert witness? 

a. Frye Standard

b. Daubert Standard

c. Mariana Standard

b. Daubert Standard

300

While taking pictures at the crime scene, it is important to:

a. Take pictures from far away. Getting too close might contaminate the crime scene. 

b. Use a ruler to provide evidence of scale (size).

c. Only observe the pictures in black and white. 

d. All of these are true.

b. Use a ruler to provide evidence of scale (size).

300

What is a white hat hacker?

a. hacker who prevents future hacking

b. a malicious hacker with intent

c. an illegal hacker but with not malicious intent

a. hacker who prevents future hacking

300

An exemplar is:

a. A sample of handwriting of a known origin and standard document taken from a suspect

b. a sample from a suspected sexual assault

c. a comparison to a piece of trace evidence recovered from a crime scene

d. a fingerprint sample

a. A sample of handwriting of a known origin and standard document taken from a suspect

300

A crime-scene sketch should include all of the following except: 

  1. A scale of distance
  2. A North direction
  3. Date and location of crime scene
  4. The type of search pattern that was used

D. The type of search pattern that was used

300

The term "Forensics" literally translates to ________________________. 

a. legal files

b. scientific law

c. of or belonging to the forum

d. criminal investigation

c. of or belonging to the forum

400

Which of the following best describes the difference between circumstantial evidence and direct evidence?

  1. Direct evidence can lead to the conviction of a suspect, while circumstantial evidence cannot.
  2. Direct evidence is not admissible in court; however, circumstantial evidence is admissible with the approval of a judge.
  3. Direct evidence is used to imply a fact, while circumstantial evidence proves an alleged fact.
  4. Direct evidence proves and alleged fact, while circumstantial evidence is used to imply a fact.

d. Direct evidence proves and alleged fact, while circumstantial evidence is used to imply a fact.

400

What is a Trojan Horse?

a. the repeated use of electronic communications

b. fraudulent acquisition and use of a person's private identity

c. computer virus delivered a piece of code

d. a program designed to breach the security of a computer system

d. a program designed to breach the security of a computer system

400

A process used by criminals to make, alter, or falsify a person’s signature or a document with the intent to deceive another person is called :

a. fraud

b. counterfeit

c. forgery

d. alteration

c. forgery

400

What are the 4 types of search patterns?

a. grid, round, line/strip, zone 

b. spiral, round, line/strip, quadrant 

c. spiral, grid, quadrant, no pattern 

d. spiral, grid, line/strip, quadrant

d. spiral, grid, line/strip, quadrant

400

Which of the following agencies does NOT maintain its own crime lab? 

a. The US Postal Service

b. The FBI

c. US Fish and Wildlife Service

d. CIA

d. CIA

500

What is the acronym the first responding officer to the crime scene must always use? 

a. FISH
b. ADAPT
c. CODIS
d. SEAS

b. ADAPT

500

Which is true about testing counterfeit currency?

a. an iodine pen turns bluish-black when in contact with starch in the counterfeit paper

b. an iodine pen turns red in the presence of starch in the counterfeit paper

a. an iodine pen turns bluish-black when in contact with starch in the counterfeit paper

500

Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute or uncertain is known as an: 

a. questioned document

b. exemplar

c. counterfeit

d. forgery

a. questioned document

500

Small amounts of trace evidence can be packed in what's called a "druggist fold." This packing paper is known as a/an_________________. 

a. bundle

b. envelope

c. bindle

d. papel

c. bindle

500

Any and all objects that can establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator are considered: 

a. material evidence

b. circumstantial evidence

c. physical evidence

d. transient evidence

c. physical evidence