Computer Forensics Chapter 2
Large digital forensics labs should have at least ________ exits. a. 2 b. 5 c. 4 d. 7
a. 2
An employer can be held liable for e-mail harassment. a. True b. False
a. True
Your business plan should include physical security items. a. true b. false
a. true
Which organization has guidelines on how to operate a digital forensics lab? a. NISPOM b. ANAB c. TEMPEST d. SCADA
b. ANAB
Evidence storage containers should have several master keys. a. True b. False
b. False
The ANAB mandates the procedures established for a digital forensics lab. a. True b. False
b. False
What term refers to labs constructed to shield EMR emissions? a. ASQ b. TEMPEST c. NISPOM d. SCADA
b. TEMPEST
A forensic workstation should always have a direct broadband connection to the Internet. a. true b. false
b. false
ASQ and ANAB are two popular certification programs for digital forensics. a. true b. false
b. false
Digital forensics facilities always have windows. a. true b. false
b. false
If a visitor to your digital forensics lab is a personal friend, it's not necessary to have him or her sign the visitor's log. a. true b. false
b. false
Which organization provides good information on safe storage containers? a. ASCLD b. ASQ c. NISPOM d. TEMPEST
c. NISPOM
Building a business case can involve which of the following? a. Procedures for gathering evidence b. Testing software c. Protecting trade secrets d. All of the above
d. All of the above
To determine the types of operating systems needed in your lab, list two sources of information you could use. a. ANAB and IACIS b. EnCE and ACE c. Uniform Crime Report statistics and a list of cases handled in your area d. Local police reports and ISFCE reports
c. Uniform Crime Report statistics and a list of cases handled in your area
Why is physical security so critical for digital forensics labs? a. To ensure continuous funding b. To make sure unwanted data isn't retained on the drive c. To protect trade secrets d. To prevent data from being lost, corrupted, or stolen
d. To prevent data from being lost, corrupted, or stolen
The manager of a digital forensics lab is responsible for which of the following? a. ensuring that staff members have enough training to do the job b. knowing the lab objectives c. making necessary changes in lab procedures and software d. all of the above
d. all of the above
Before enlisting in a certification program, thoroughly research the requirements, ________, and acceptability in your area of employment. a. business hours b. number of students c. location d. cost
d. cost
Typically, a(n) ________ lab has a separate storage area or room for evidence. a. federal b. research c. state d. regional
d. regional