Computer Forensics Chapter 1 HW

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Data Recovery

A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?

an affidavit

What does the investigator in a criminal or public-sector case submit, at the request of the prosecuting attorney, if he or she has enough information to support a search warrant?

Misuse of digital assests

What is most often the focus of digital investigations in the private sector?

Prosecution

What is the third stage of a criminal case, after the complaint and the investigation?

It must be notarized

What must be done, under oath, to verify that the information in the affidavit is true?

End User

What term refers to a person using a computer to perform routine tasks other than systems administration?

Authorized Requester

What term refers to the individual who has the power to conduct digital forensic investigations?

Subpoena

When an investigator seeks a search warrant, which of the following must be included in an affidavit to support the allegation of a crime?

Criminal

Which Pacific Northwest agency meets to discuss problems that digital forensics examiners encounter?

IACIS

Which agency introduced training on software for forensics investigations by the early 1990s?

Computer Analysis and Response Team (CART)

Which entity was formed by the FBI in 1984 to handle the increasing number of cases involving digital evidence?

Digital Investigations

Which group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime?

Forensics Investigators

Which group often works as part of a team to secure an organization's computers and networks?

Allegation

Which term refers to an accusation or supposition of fact that a crime has been committed and is made by the complainant, based on the incident?

Privacy

Without a warning banner, what right might employees assume they have when using a company's computer systems and network accesses?


Ensembles d'études connexes

Chapter 20 Program Design and Technique for Aerobic Endurance Training

View Set

Topic 10: Elimination and Reproduction

View Set

ES Chapter 28 Our Solar System Study Guide

View Set

Music Appreciation: Romantic Period Era

View Set