Examlex
Presented below is a list of terms relating to the different types of evidence and the evidence collection process,followed by definitions of those terms.
Required: Match the letter next to each definition with the appropriate term.Each answer will be used only once.
________ 1.Observation
________ 2.Invigilation
________ 3.Surveillance
________ 4.Document examiners
________ 5.Search warrant
________ 6.Subpoena
________ 7.Predication
________ 8.Tracing
________ 9.Questioned document
________ 10.Vouching
A.A widely accepted principle that requires that investigations be started or continued only when there is a reasonable basis to do so
B.Following a source document that evidences a transaction through the entire accounting cycle
C.The use of the senses to assess the behavior of persons and other activities such as business processes
D.A court order that authorizes law enforcement to search for and seize evidence
E.Surreptitious observation
F.Document evidence whose authenticity or authorship is in question
G.An order from a government agency or officer of a court that compels the recipient,under penalty,to produce physical evidence,documents,or testimony
H.People who specialize in analyzing questioned documents
I.Selecting numbers in accounts and following them backward in the accounting cycle to the source documents
J.An observation technique that involves observing a suspect's behavior before,during,and after an announced investigation
Bailment
The legal relationship arising when physical possession, but not ownership, of personal property is transferred from one person to another under agreement.
Storage
The action or method of storing goods or information for future use.
Simple Delivery Contract
An agreement where the seller is obligated to transfer possession of a specified good or item to the buyer upon receipt of payment.
Title Transfer
The process of legally changing ownership of property or assets from one person or entity to another.
Q5: ISO27001 includes 132 general security controls,organized under
Q9: The verification of a digital signature involves
Q12: Which of the following is an example
Q77: One recovery strategy in the event of
Q84: Which of the following procedures would deter
Q97: The segregation of authorization from the recording
Q111: Jennifer Nguyen is interested in archiving several
Q117: Discuss how batch totals are prepared and
Q127: Fraud detection is often an imperfect process.
Q152: Botnets are normally used for which of