PrepAway - Latest Free Exam Questions & Answers

Which of the following best describes exigent circumstances?

Which of the following best describes exigent circumstances?

PrepAway - Latest Free Exam Questions & Answers

A.
The methods used to capture a suspect’s actions are neither legal nor ethical.

B.
Enticement is used to capture a suspect’s actions.

C.
Hacking does not actually hurt anyone.

D.
The seizure of evidence by law enforcement because there is concern that a suspect will attempt to destroy it.

Explanation:
D: Search and seizure activities can get tricky, depending on what is being searched for and where. In some circumstances, a law enforcement agent
may seize evidence that is not included in the warrant, such as if the suspect tries to destroy the evidence. In other words, if there is an impending
possibility that evidence might be destroyed, law enforcement may quickly seize the evidence to prevent its destruction. This is referred to as exigent
circumstances, and a judge will later decide whether the seizure was proper and legal before allowing the evidence to be admitted. For example, if a police
officer had a search warrant that allowed him to search a suspect’s living room but no other rooms, and then he saw the suspect dumping cocaine down
the toilet, the police officer could seize the cocaine even though it was in a room not covered under his search warrant.
A is incorrect because entrapment is used to describe illegal and/or unethical methods that are used to capture a suspect’s actions. For example,
suppose a Web page has a link that indicates that if an individual clicks it, she could then download thousands of MP3 files for free. However, when she
clicks that link, she is taken to the honeypot system instead, and the company records all of her actions and attempts to prosecute. Entrapment does not
prove that the suspect had the intent to commit a crime; it only proves she was successfully tricked.
B is incorrect because enticement means that legal and ethical means were used to capture a suspect’s actions, as opposed to illegal and unethical
methods, which are referred to as entrapment. A honeypot serves as a good example of enticement. Companies put systems in their screened subnets
that either emulate services that attackers usually like to take advantage of or actually have the services enabled. The hope is that if an attacker breaks into
the company’s network, she will go right to the honeypot instead of the systems that are actual production machines. The attacker will be enticed to go to
the honeypot system because it has many open ports and services running and exhibits vulnerabilities that the attacker would want to exploit. The
company can log the attacker’s actions and later attempt to prosecute.
C is incorrect because the idea that hacking does not actually hurt anyone is a common ethical fallacy. It is used by some in the computing world to
justify unethical acts, such as capturing passwords and using them to gain unauthorized access to network resources. The phrase does not define exigent
circumstances.

2 Comments on “Which of the following best describes exigent circumstances?


Leave a Reply