IS381 Module Quiz 2
Large digital forensics labs should have at least ________ exits. - 2 - 7 - 5 - 4
2
Which organization has guidelines on how to operate a digital forensics lab? 1. NISPOM 2. SCADA 3. TEMPEST 4. ANAB
ANAB
Building a business case can involve which of the following? 1. Procedures for gathering evidence 2. Testing software 3. Protecting trade secrets 4. All of the above
All of the above
The manager of a digital forensics lab is responsible for which of the following? 1. Making necessary changes in lab procedures and software 2. Ensuring that staff members have enough training to do the job 3. Knowing the lab objectives 4. All of the above
All of the above
Before enlisting in a certification program, thoroughly research the requirements, ________, and acceptability in your area of employment. 1. Location 2. Number of students 3. Cost 4. Business hours
Cost
A forensic workstation should always have a direct broadband connection to the Internet. True False
False
ASQ and ANAB are two popular certification programs for digital forensics. True False
False
Digital forensics facilities always have windows. True False
False
Evidence storage containers should have several master keys. True False
False
If a visitor to your digital forensics lab is a personal friend, it's not necessary to have him or her sign the visitor's log. True False
False
The ANAB mandates the procedures established for a digital forensics lab. True False
False
Which organization provides good information on safe storage containers? 1. NISPOM 2. ASQ 3. ASCLD 4. TEMPEST
NISPOM
Typically, a(n) ________ lab has a separate storage area or room for evidence. 1. State 2. Regional 3. Research 4. Federal
Regional
What term refers to labs constructed to shield EMR emissions? 1. ASQ 2. TEMPEST 3. NISPOM 4. SCADA
TEMPEST
Why is physical security so critical for digital forensics labs? 1. To ensure continuous funding 2. To make sure unwanted data isn't retained on the drive 3. To protect trade secrets 4. To prevent data from being lost, corrupted, or stolen
To prevent data from being lost, corrupted, or stolen
An employer can be held liable for e-mail harassment. True False
True
Your business plan should include physical security items. True False
True
To determine the types of operating systems needed in your lab, list two sources of information you could use. 1. ANAB and IACIS 2. EnCE and ACE 3. Uniform Crime Report statistics and a list of cases handled in your area 4. Local police reports and ISFCE reports
Uniform Crime Report statistics and a list of cases handled in your area