Chapter 01: Understanding the Digital Forensics Profession & Investigations - Chapter 1
Sworn statement of support of facts about or evidence of a crime that is submitted to a judge to request a search warrant before seizing evidence?
Affidavit
What term refers to the individual who has the power to conduct digital forensic investigations?
Authorized requester
Which Pacific Northwest agency meets to discuss problems that digital forensics examiners encounter?
CTIN
Which entity was formed by the FBI in 1984 to handle the increasing number of cases involving digital evidence?
Computer Analysis and Response Team
Which type of case involves charges such as burglary,murder,or molestation?
Criminal
Computer investigations and forensics fall into the same category: public investigations.
False
Which group often works as part of a team to secure an organization's computer and networks?
Forensics Investigators
Which agency introduced training on software for forensics investigations by the early 1990s?
IACIS
What is most often the focus of digital investigations in the private sector?
Misue of digital assets
Yields information about how attackers gain access to a network along with files they might have copied,examined,or tampered with?
Network forensics
Maintaining credibility means you must form and sustain unbiased opinions of your cases.
True
The Fourth Amendment to the U.S. Constitution (and each state's constitution) protects everyone's right to be secure in their person, residence, and property from search and seizure.
True
Which group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime?
Digital Investigators
The application of science to the identification,collection,examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data?
Digital forensics
When an investigator seeks a search warrant, what must be included in an affidavit to support the allegation of a crime?
Exhibits
Without a warning banner, what right might employees assume they have when using a company's computer systems and network access?
Privacy
By the 1970s, electronic crimes were increasing, especially in the financial sector.
True
Which term refers to an accusation or supposition of a fact that a crime has been committed and is made by the complaint, based on the incident?
Allegation
What usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will?
A warning banner
What does the investigator in a criminal or public-sector case submit, at the request of the prosecuting attorney, if he or she has enough information to support a search warrant?
An affidavit
A person who has the power to initiate investigations in a corporate environment?
Authorized requester
Lists each piece of evidence on a separate page?
Single-evidence form
After a judge approves and signs a search warrant, it's ready to be executed , meaning you can collect evidence as defined by the warrant.
True
The definition of digital forensics has evolved over the years from simply involving and securing and analyzing digital information stored on a computer for use as evidence in civil, criminal, or administrative cases.
True
Allows legal counsel to use previous cases similar to the current one because laws don't yet exist?
Case law
A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?
Data Recovery
What term refers to a person using a computer to perform routine tasks other than systems administration?
End user
The law of search and seizure protects the rights of all people, excluding people suspected of crimes.
False
When you work in the enterprise digital group, you test and verify the integrity of standalone workstations and network servers.
False
Involves selling sensitive or confidential company information to a competitor?
Industrial espionage
The process of trying to get a suspect to confess to a specific incident or crime?
Interrogation
What must be done, under oath, to verify the information in the affidavit is true?
It must be notarized
Specifies who has the legal right to initiate an investigation , who can take possession of evidence, and who can have evidence?
Line of authority
What do published company policies provide for a business that enables them to conduct internal investigations?
Line of authority
What investigator characteristic, which includes ethics,morals, and standards of behavior, determines the investigator's credibility?
Professional conduct
What is the third stage of a criminal case, after the complaint and the investigation?
Prosecution
Which doctrine, found to be unconstitutional, was used to allow a civilian or private-sector investigative agent to deliver evidence obtained in a manner that violated the Fourth Amendment to law enforcement agency?
Silver-platter
The police blotter provides a record of clues to crimes that have been committed previously.
True
To be a successful computer forensics investigator, you must be familiar with more than one computing platform.
True
Recognizes file types and retrieves lost or deleted files.
Xtree Gold