IS381 Module Quiz 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Large digital forensics labs should have at least ________ exits. - 2 - 7 - 5 - 4

2

Which organization has guidelines on how to operate a digital forensics lab? 1. NISPOM 2. SCADA 3. TEMPEST 4. ANAB

ANAB

Building a business case can involve which of the following? 1. Procedures for gathering evidence 2. Testing software 3. Protecting trade secrets 4. All of the above

All of the above

The manager of a digital forensics lab is responsible for which of the following? 1. Making necessary changes in lab procedures and software 2. Ensuring that staff members have enough training to do the job 3. Knowing the lab objectives 4. All of the above

All of the above

Before enlisting in a certification program, thoroughly research the requirements, ________, and acceptability in your area of employment. 1. Location 2. Number of students 3. Cost 4. Business hours

Cost

A forensic workstation should always have a direct broadband connection to the Internet. True False

False

ASQ and ANAB are two popular certification programs for digital forensics. True False

False

Digital forensics facilities always have windows. True False

False

Evidence storage containers should have several master keys. True False

False

If a visitor to your digital forensics lab is a personal friend, it's not necessary to have him or her sign the visitor's log. True False

False

The ANAB mandates the procedures established for a digital forensics lab. True False

False

Which organization provides good information on safe storage containers? 1. NISPOM 2. ASQ 3. ASCLD 4. TEMPEST

NISPOM

Typically, a(n) ________ lab has a separate storage area or room for evidence. 1. State 2. Regional 3. Research 4. Federal

Regional

What term refers to labs constructed to shield EMR emissions? 1. ASQ 2. TEMPEST 3. NISPOM 4. SCADA

TEMPEST

Why is physical security so critical for digital forensics labs? 1. To ensure continuous funding 2. To make sure unwanted data isn't retained on the drive 3. To protect trade secrets 4. To prevent data from being lost, corrupted, or stolen

To prevent data from being lost, corrupted, or stolen

An employer can be held liable for e-mail harassment. True False

True

Your business plan should include physical security items. True False

True

To determine the types of operating systems needed in your lab, list two sources of information you could use. 1. ANAB and IACIS 2. EnCE and ACE 3. Uniform Crime Report statistics and a list of cases handled in your area 4. Local police reports and ISFCE reports

Uniform Crime Report statistics and a list of cases handled in your area


Conjuntos de estudio relacionados

Promoting Healthy Pop ATI Violence for exam 3

View Set

OB Module 12: Change Management and Stress

View Set

ECON 200 Business Cycle, Unemployment, and Inflation

View Set

Mental Health Exam 2 NCLEX questions

View Set