100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
OSINT Quiz Questions All with 100% Correct Verified Solutions $13.99   Add to cart

Exam (elaborations)

OSINT Quiz Questions All with 100% Correct Verified Solutions

 1 view  0 purchase
  • Course
  • OSINT
  • Institution
  • OSINT

OSINT Quiz Questions All with 100% Correct Verified Solutions

Preview 4 out of 54  pages

  • October 3, 2024
  • 54
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • OSINT
  • OSINT
avatar-seller
KenAli
OSINT Quiz Questions All with
100% Correct Verified Solutions

Electronic Communications Privacy Act (EPCA) - Answer The _______ was enacted in
1986 and is composed of three acts: the Wiretap Act, the Stored Communications Act
(SCA), and the Pen Register Act.


1. Wiretap Act
2. Stored Communications Act (SCA)

3. Pen Register Act. - Answer The Electronic Communications Privacy Act (EPCA)
was enacted in 1986 and is composed of three acts:


Children's Online Privacy Protection Act (COPPA) - Answer ________ and the FTC's
implementing regulations prohibit covered operators from collecting or using
"personal information" from children under the age of thirteen without first obtaining
parental consent.


USA PATRIOT Act - Answer In 2001 the ________ (formally, the Uniting and
Strengthening America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorism Act of 2001) granted federal police agencies the authority to
search the business records of individuals it suspected of involvement in terrorism,
including their library records.

,legally - Answer Agencies must create a machine that is only ____ secure but also
operationally protected from hackers.


standalone - Answer The computer must be _____ and must not be networked with
another computer in any way. In and of itself, this network issue can raise considerable
discussion among investigators. However, the fewer people who have contact with the
potential evidence on the undercover hard drive, the better. This leaves fewer "smoke
and mirror" arguments from defense attorneys.


drive trays - Answer The computer should have removable ______. This permits the
investigator to remove and lock up a particular drive when it is not in use.


open - Answer Online investigators should work in an office that is not _____ to
pedestrian traffic from coworkers or visitors. This type of work can be very
demanding, requiring concentration and minimal distractions.


Search By Image - Answer What Firefox addon would you use for searching images?


end-all - Answer Firefox addon tools are not the _____ You will constantly need to find
new tools and resources as they change daily



Firefox Containers - Answer What Firefox addon would you use for separating out
sock puppet accounts into their own instance?



User Agent - Answer What Firefox addon would you use to view a website with
a different user agent?

,searching - Answer Legally, in the US, there are no court rules, statutes, or laws that
specifically prevent you from _____ a subject's social networking profile, However,
there are laws against direct contact with a subject who is represented by counsel.



direct contact - Answer Legally, in the US, there are no court rules, statutes, or laws that
specifically prevent you from searching a subject's social networking profile, However,
there are laws against _______ with a subject who is represented by counsel.



represented by counsel - Answer Legally, in the US, there are no court rules, statutes,
or laws that specifically prevent you from searching a subject's social networking
profile, However, there are laws against direct contact with a subject who is _______.


A. Investigating complaints
B. Learning about complainants

C. Learning about witnesses - Answer How might you use social media as
an investigative tool?


mundane - Answer People frequently post information on these sites about _____
aspects of their lives that they would probably not share with someone during a verbal
conversation.


Deception - Answer is relevant when examining social media services



inconsistencies - Answer Frequently when someone is lying, an investigator will be
able to identify ______ in the timeline, the
circumstances surrounding key events, or other areas within the questioning.



circumstances - Answer Frequently when someone is lying, an investigator will be
able to identify inconsistencies in the timeline, the

, _______ surrounding key events, or other areas within the questioning.



breadth and depth - Answer Based on a person's job, geographic location, age, etc.,
investigators should have a basic idea of the ______ of information that such a
person should know.



the truth - Answer Inconsistencies in actions or words do not necessarily indicate a
lie, just as consistency is not necessarily a guarantee of the _____. However, a pattern
of inconsistencies or unexplainable behavior normally indicates deceit.


Inconsistencies - Answer _____ in actions or words do not necessarily indicate a lie, just
as consistency is not necessarily a guarantee of the truth. However, a pattern
of inconsistencies or unexplainable behavior normally indicates deceit.



deceit - Answer Inconsistencies in actions or words do not necessarily indicate a lie,
just as consistency is not necessarily a guarantee of the truth. However, a pattern of
inconsistencies or unexplainable behavior normally indicates _______.



unexplainable behavior - Answer Inconsistencies in actions or words do not necessarily
indicate a lie, just as consistency is not necessarily a guarantee of the truth. However,
a pattern of inconsistencies or _________ normally indicates deceit.


backtrack - Answer Always copy URL addresses because sometimes you can't ______


URL addresses - Answer Always copy _______ because sometimes you can't backtrack



Deception - Answer is defined as a deliberate act with the intent to mislead others while
the recipients are not made aware or expect that such an act is taking place and that
the goal of the deceiver is to transfer that false belief to the deceived ones.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.99
  • (0)
  Add to cart