computer forensics

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

List an organization mentioned in this chapter that provides computer forensics training.

CTIN

A corporate investigator must follow Fourth Amendment standards when conducting an investigation. True or False?

False

Computer forensics and data recovery refer to the same activities. True or False?

False

Under normal circumstances, a corporate investigator is considered an agent of law enforcement. True or False?

False

Police in the United States must use procedures that adhere to which of the following? a. third amendment b.fourth amendment c. first amendment

Fourth Amendment

List a type of computer investigation is not typically conducted in the corporate environment.

General use of company software

What is the purpose of maintaining a professional journal?

It can be used as a reference to help you recall how you solved a difficult problem.

What is the purpose of an affidavit?

It is a legal document used to justify the issuing of a warrant

Laws and procedures for PDAs are which of the following? a. well established b.still be debated c.on the law books d.none of the above

Still being debated

Which of these statements would be best suited for a company's internal warning display banner?

This company reserves the right to monitor all emails, information sharing, downloads, and internet use within the workplace.

What is the purpose of maintaining a network of other computer forensics specialists?

To have the option of calling on diversified specialists to help with a case.

Why should companies appoint an authorized requester for computer investigations?

To reduce conflicts from competing interests among organizations or departments.

Warning banners are often easier to present in court than policy manuals are. True or False?

True

The triad of computing security includes which of the following?

Vulnerability assessment, intrusion response, and investigation

What are the necessary components of a search warrant?

Who, what , when, and where. In many cases, a search warrant may be limiting in scope of what can be seized.

Which of these are common types of digital crime? (Choose all that apply) a.harassment b.cyber-stalking c.embezzlement d.battery

a.harassment b.cyber-stalking c.embezzlement

Policies can address rules for which of the following? a. when you can log on to a company network from home b. the internet sites you can or cannot access c. the amount of personal e-mail you can send d. any of the above

any of the above

What is professional conduct?

standards of behavior


Ensembles d'études connexes

Sociology: A Brief Introduction, Chapter 14

View Set

Threats, Attacks, and Vulnerabilities

View Set

Economics - International Trade Part 3

View Set

Sickle Cell (Mendelian Genetics Probability WS)

View Set

Oceanography Chapter 6 study guide🌊

View Set

Healthcare Reimbursement Final Exam

View Set

BSG Quiz 1, BUS 490 BSG Simulation Quiz 1, BSG Quiz 1, BSG Chapter 1 Quiz

View Set

Principles of Information Security Ch. 1 Self-Quiz

View Set