Chapter 01: Understanding the Digital Forensics Profession & Investigations - Chapter 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Sworn statement of support of facts about or evidence of a crime that is submitted to a judge to request a search warrant before seizing evidence?

Affidavit

What term refers to the individual who has the power to conduct digital forensic investigations?

Authorized requester

Which Pacific Northwest agency meets to discuss problems that digital forensics examiners encounter?

CTIN

Which entity was formed by the FBI in 1984 to handle the increasing number of cases involving digital evidence?

Computer Analysis and Response Team

Which type of case involves charges such as burglary,murder,or molestation?

Criminal

Computer investigations and forensics fall into the same category: public investigations.

False

Which group often works as part of a team to secure an organization's computer and networks?

Forensics Investigators

Which agency introduced training on software for forensics investigations by the early 1990s?

IACIS

What is most often the focus of digital investigations in the private sector?

Misue of digital assets

Yields information about how attackers gain access to a network along with files they might have copied,examined,or tampered with?

Network forensics

Maintaining credibility means you must form and sustain unbiased opinions of your cases.

True

The Fourth Amendment to the U.S. Constitution (and each state's constitution) protects everyone's right to be secure in their person, residence, and property from search and seizure.

True

Which group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime?

Digital Investigators

The application of science to the identification,collection,examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data?

Digital forensics

When an investigator seeks a search warrant, what must be included in an affidavit to support the allegation of a crime?

Exhibits

Without a warning banner, what right might employees assume they have when using a company's computer systems and network access?

Privacy

By the 1970s, electronic crimes were increasing, especially in the financial sector.

True

Which term refers to an accusation or supposition of a fact that a crime has been committed and is made by the complaint, based on the incident?

Allegation

What usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will?

A warning banner

What does the investigator in a criminal or public-sector case submit, at the request of the prosecuting attorney, if he or she has enough information to support a search warrant?

An affidavit

A person who has the power to initiate investigations in a corporate environment?

Authorized requester

Lists each piece of evidence on a separate page?

Single-evidence form

After a judge approves and signs a search warrant, it's ready to be executed , meaning you can collect evidence as defined by the warrant.

True

The definition of digital forensics has evolved over the years from simply involving and securing and analyzing digital information stored on a computer for use as evidence in civil, criminal, or administrative cases.

True

Allows legal counsel to use previous cases similar to the current one because laws don't yet exist?

Case law

A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?

Data Recovery

What term refers to a person using a computer to perform routine tasks other than systems administration?

End user

The law of search and seizure protects the rights of all people, excluding people suspected of crimes.

False

When you work in the enterprise digital group, you test and verify the integrity of standalone workstations and network servers.

False

Involves selling sensitive or confidential company information to a competitor?

Industrial espionage

The process of trying to get a suspect to confess to a specific incident or crime?

Interrogation

What must be done, under oath, to verify the information in the affidavit is true?

It must be notarized

Specifies who has the legal right to initiate an investigation , who can take possession of evidence, and who can have evidence?

Line of authority

What do published company policies provide for a business that enables them to conduct internal investigations?

Line of authority

What investigator characteristic, which includes ethics,morals, and standards of behavior, determines the investigator's credibility?

Professional conduct

What is the third stage of a criminal case, after the complaint and the investigation?

Prosecution

Which doctrine, found to be unconstitutional, was used to allow a civilian or private-sector investigative agent to deliver evidence obtained in a manner that violated the Fourth Amendment to law enforcement agency?

Silver-platter

The police blotter provides a record of clues to crimes that have been committed previously.

True

To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

True

Recognizes file types and retrieves lost or deleted files.

Xtree Gold


Ensembles d'études connexes

Veggies- True/False Questions Evens

View Set

Ethics- Chapter 5- Divine Command Theory and Civil Religion

View Set

Pharm III, EXAM 2 "Potential" Questions

View Set

Chapter 40: Fluid, Electrolyte, and Acid-Base Balance

View Set

American Democracy Now Chapter 2

View Set