Computer Forensics Chapter 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

The affidavit must be ____ under sworn oath to verify that the information in the affidavit is true.

Notarized

In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.

affidavit

A(n) ____ is a person using a computer to perform routine tasks other than systems administration.

end user

Maintaining ____ means you must form and sustain unbiased opinions of your cases.

objectivity

The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.

Computer Investigations

Published company policies provide a(n) ____ for a business to conduct internal investigations.

Line of Authority

In general, a criminal case follows three stages: the complaint, the investigation, and the ____.

Prosecution

Without a warning banner, employees might have an assumed ____ when using a company's computer systems and network accesses.

Right of Privacy

Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.

Silver-Platter

____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.

data recovery


Conjuntos de estudio relacionados

Professionalism role of the nurse

View Set

Szociálpszichológia I. - Kísérletek

View Set

Check Your Understanding - 44, 45, 47, 51, 52

View Set

COP1000 Intro to Computer Programming Alice Video Quizzes

View Set