Forensic Chapter 1 - 8
In a ____ case, a suspect is charged for a criminal offense, such as burglary, murder, or molestation.
Criminal
____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.
Data recovery
A ____ is where you conduct your investigations, store evidence, and do most of your work.
Digital forensics lab
A ____ plan specifies how to rebuild a forensic workstation after it has been severely contaminated by a virus from a drive you're analyzing.
Disaster Recovery
Computer investigations and forensics fall into the same category: public investigations.
False
Maintaining credibility means you must form and sustain unbiased opinions of your cases.
False
____ often work as part of a team to secure an organization's computers and networks.
Forensics investigators
Windows hard disks can now use a variety of file systems, including FAT16, FAT32, ____, and Resilient File System.
NTFS
Floors and carpets on your computer forensic lab should be cleaned at least ____ a week to help minimize dust that can cause static electricity.
Once
Your ____ as a digital investigation and forensics analyst is critical because it determines your credibility.
Professional conduct
In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
Prosecution
Lab costs can be broken down into monthly, ____, and annual expenses.
Quarterly
For labs using high-end ____ servers or a private cloud (such as Dell PowerEdger or Digital Intelligence FREDC), you must consider methods for restoring large data sets.
RAID
Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.
Silver-platter
During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.
TEMPEST
A forensics analysis of a 6 TB disk, for example, can take several days or weeks
True
The Fourth Amendment to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.
True
To be a successful computer forensics investigator, you must be familiar with more than one computing platform.
True
In the ____, you justify acquiring newer and better resources to investigate digital forensics cases.
Business Case
The EMR from a computer monitor can be picked up as far away as ____ mile.
1/2