题目详情

计算机取证是将计算机调查和分析技术应用于对潜在的、有法律效应的确定和提取。以下关于计算机取证的描述中,错误的是(16)。

  • A.计算机取证的通常步骤有:准备工作、保护目标计算机系统(保护现场)、确定电子证据、收集电子证据、保全电子证据
  • B.计算机取证的工具有X-Ways Forensics、X-Ways Trace、FBI等
  • C.计算机取证时,可先将目标主机设置为蜜罐,等待犯罪嫌疑人破坏证据时,一举抓获
  • D.电子证据综合了文本、图形、图像、动画、音频及视频等多种类型的信息

正确答案及解析

正确答案
C
解析

计算机取证时首先必须隔离目标计算机系统,不给犯罪嫌疑人破坏证据的机会。实际取证工作需要遵循一个重要的原则:尽量避免在被调查的计算机上进行工作。

试题答案:C

包含此试题的试卷

你可能感兴趣的试题

单选题

( )is that it provides guidance and direction on how quality will be managed and verified throughout the project.

  • A.Plan Quality Management
  • B.Manage Quality
  • C.Control Quality
  • D.Project Charter
查看答案
单选题

( )the process of determining,documenting,and managing stakeholder needs and requirements to meet Project objectives.

  • A.Plan Scope Management
  • B.Collection Requirements
  • C.Validate Scope
  • D.Control Scope
查看答案
单选题

The information security management system preserves the confidentiality,integrity and availability of information by applying a( ).

  • A.technology management process
  • B.resource management process
  • C.quality management process
  • D.risk management process
查看答案
单选题

( )is a decentralized database,ensure that the data will not be tampered with and forged.

  • A.Artificial intelligence
  • B.Blockchain
  • C.Sensing technology
  • D.Big datA
查看答案
单选题

( )puts computer resources on the web,and must meet the requirements of super capacity,super concurrency,super speed and super security.

  • A.Cloud computing
  • B.Big datA
  • C.Blockchain
  • D.Internet of things
查看答案

相关题库更多 +