Forensics Chapter 1
What does the investigator in a criminal or public-sector case submit, at the request of the prosecuting attorney, if he or she has enough information to support a search warrant?
An affidavit
What term refers to the individual who has the power to conduct digital forensic investigations?
Authorized Requester
Which entity was formed by the FBI in 1984 to handle the increasing number of cases involving digital evidence?
Computer Analysis and Response Team
Which type of case involves charges such as burglary, murder, or molestation?
Criminal
What term refers to a person using a computer to perform routine tasks other than systems administration?
End User
When an investigator seeks a search warrant, which of the following must be included in an affidavit to support the allegation of a crime?
Exhibits
Which agency introduced training on software for forensics investigations by the early 1990s?
IACIS
What must be done, under oath, to verify that the information in the affidavit is true?
It must be notarized.
What is most often the focus of digital investigations in the private sector?
Misuse of digital assets
Without a warning banner, what right might employees assume they have when using a company's computer systems and network accesses?
Privacy
What investigator characteristic, which includes ethics, morals, and standards of behavior, determines the investigator's credibility?
Professional Conduct