Video Surveillance can be form of Digital evidence
a. True
b. False

1 Answer

Answer :

a. True

Related questions

Description : Digital Evidence is only useful in court of law a. True b. False

Last Answer : b. False

Description : Digital evidence is only useful in a court of law. a. True b. False

Last Answer : b. False

Description : Digital evidence alone can be used to build a solid case. a. True b. False

Last Answer : b. False

Description : All of forensic examination should be perform on a original digital evidence (a) True (b) False

Last Answer : (a) True

Description : Is it true that Electronic audio and video devices are never used by terrorists for surveillance purposes?

Last Answer : Feel Free to Answer

Description : Digital evidence is only useful in a court of law a) True b) False

Last Answer : b) False

Description : What is the best video surveillance system?

Last Answer : I have several nest cams, may not be the best system but they are versatile and reliable.

Description : Any recomendations for a wireless indoor/outdoor video surveillance system?

Last Answer : How about a wildlife camera system?

Description : What are the benefits companies gain by installing a video surveillance system?

Last Answer : When video surveillance camera was installed in my workplace, most of us saw it as intrusion of privacy but the fact is that, its beneficial to the company. It reduces risk of employee theft and ... shoulders to be sure they are doing their work. It also wards off illegal visitors and strangers.

Description : Where can I find more information about video surveillance?

Last Answer : You can find a store in your area that sells video surveillance cameras & then you can ask more questions there you are can do a little research about your area to see if there are any professionals in that area.

Description : What is a video surveillance program?

Last Answer : Video surveillance is where you have a video that is recording what is going on. Like Casinos have cameras that record everyone in the Casino. Yet the cameras are also be monitored and watched by others to catch those that are cheating.

Description : Video Surveillance For Your Home?

Last Answer : Having the feeling of total security and peace of mind, is what every family desires. Having a surveillance video camera installed in your home can assist in your security in a number of ways. ... surveillance video in your children's room or nursery to make sure your children are safe and secure.

Description : The Benefits of Using a Video Remote Surveillance System?

Last Answer : If you're looking to upgrade your home security profile to include a video surveillance system, then you really should look into the benefits o using a remote system as opposed to a standard "hard wired" ... camera feeds at the touch of a button, wherever you have access to a PC and the internet.

Description : Where to Install Video Surveillance Cameras?

Last Answer : Video surveillance cameras are a great way to keep an eye on your home and your valuables. While many people who install video surveillance cameras automatically put them directly above doors and windows, many ... you are making it easier to track down the thieves if they get away with your stuff.

Description : Testimonial is the major type of Evidence. a. True b. False c. None d. N/A

Last Answer : a. True

Description : 1 Digital Evidence in the form of the: A)Office File B)E-mail Messages C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : Which of the following is not the form of digital evidence: a. Text messages b. Emails c. Pictures d. Paper

Last Answer : d. Paper

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the abov

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : In term of Digital evidence, the internet is an example of a. Open computer System b. Communication System c. Embedded Computer System d. None of the above

Last Answer : b. Communication System

Description : 3. In term of Digital evidence, a mobile telephone is an example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : c. Embedded Computer System

Description : In term of Digital evidence, a hard drive is example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : a. Open Computer System

Description : . A Valid Definition of Digital Evidence is a. Data Stored or transmitted using a computer b. Information of Probative value c. Digital dada of probative Value d. Any digital evidence on compute

Last Answer : c. Digital dada of probative Value

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : b. Communication systems

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : . In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : 3. In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : a. Open computer systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : . A valid definition of digital evidence is: a. Data stored or transmitted using a computer b. Information of probative value c. Digital data of probative value d. Any digital evidence on a computer

Last Answer : c. Digital data of probative value

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Digital Evidence must follow the requirement of the A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned

Last Answer : D)All of the mentioned

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Digital evidences are also called as : a. Digital proof b. Evidence c. Hidden Truth d. Electronic Evidence

Last Answer : d. Electronic Evidence

Description : Digital evidence must follow the requirements of the …….. a. Ideal evidence b. Best evidence c. Exchange evidence d. All of the mentioned

Last Answer : b. Best evidence

Description : The evidence or proof that can be obtained from the electronic source is called the ……… a. Digital evidence b. Demonstrative evidence c. Explainable evidence d. Substantial evidence

Last Answer : a. Digital evidence

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : The digital evidence are used to establish a credible link between…… a. Attacker and victim and the crime scene b. Attacker and the crime scene c. Victim and the crime scene d. Attacker and information

Last Answer : a. Attacker and victim and the crime scene

Description : Rule of evidence is called as …………. a. Digital Evidence b. Law of Evidence c. Hidden Evidence d. Electronic Evidence

Last Answer : b. Law of Evidence

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital Evidences d. None of the above.

Last Answer : c. Private networks contain a higher concentration of digital Evidences

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : d. None of the above

Description : In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : a. Open computer systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems