Forensic Chapter 1 - 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

In a ____ case, a suspect is charged for a criminal offense, such as burglary, murder, or molestation.

Criminal

____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.

Data recovery

A ____ is where you conduct your investigations, store evidence, and do most of your work.

Digital forensics lab

A ____ plan specifies how to rebuild a forensic workstation after it has been severely contaminated by a virus from a drive you're analyzing.

Disaster Recovery

Computer investigations and forensics fall into the same category: public investigations.

False

Maintaining credibility means you must form and sustain unbiased opinions of your cases.

False

____ often work as part of a team to secure an organization's computers and networks.

Forensics investigators

Windows hard disks can now use a variety of file systems, including FAT16, FAT32, ____, and Resilient File System.

NTFS

Floors and carpets on your computer forensic lab should be cleaned at least ____ a week to help minimize dust that can cause static electricity.

Once

Your ____ as a digital investigation and forensics analyst is critical because it determines your credibility.

Professional conduct

In general, a criminal case follows three stages: the complaint, the investigation, and the ____.

Prosecution

Lab costs can be broken down into monthly, ____, and annual expenses.

Quarterly

For labs using high-end ____ servers or a private cloud (such as Dell PowerEdger or Digital Intelligence FREDC), you must consider methods for restoring large data sets.

RAID

Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.

Silver-platter

During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.

TEMPEST

A forensics analysis of a 6 TB disk, for example, can take several days or weeks

True

The Fourth Amendment to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.

True

To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

True

In the ____, you justify acquiring newer and better resources to investigate digital forensics cases.

Business Case

The EMR from a computer monitor can be picked up as far away as ____ mile.

1/2


Conjuntos de estudio relacionados

Ward: Ch 27: Caring for the Child With an Endocrinological or Metabolic Condition

View Set

Landforms and resources of United States and Canada

View Set