computer forensics
List an organization mentioned in this chapter that provides computer forensics training.
CTIN
A corporate investigator must follow Fourth Amendment standards when conducting an investigation. True or False?
False
Computer forensics and data recovery refer to the same activities. True or False?
False
Under normal circumstances, a corporate investigator is considered an agent of law enforcement. True or False?
False
Police in the United States must use procedures that adhere to which of the following? a. third amendment b.fourth amendment c. first amendment
Fourth Amendment
List a type of computer investigation is not typically conducted in the corporate environment.
General use of company software
What is the purpose of maintaining a professional journal?
It can be used as a reference to help you recall how you solved a difficult problem.
What is the purpose of an affidavit?
It is a legal document used to justify the issuing of a warrant
Laws and procedures for PDAs are which of the following? a. well established b.still be debated c.on the law books d.none of the above
Still being debated
Which of these statements would be best suited for a company's internal warning display banner?
This company reserves the right to monitor all emails, information sharing, downloads, and internet use within the workplace.
What is the purpose of maintaining a network of other computer forensics specialists?
To have the option of calling on diversified specialists to help with a case.
Why should companies appoint an authorized requester for computer investigations?
To reduce conflicts from competing interests among organizations or departments.
Warning banners are often easier to present in court than policy manuals are. True or False?
True
The triad of computing security includes which of the following?
Vulnerability assessment, intrusion response, and investigation
What are the necessary components of a search warrant?
Who, what , when, and where. In many cases, a search warrant may be limiting in scope of what can be seized.
Which of these are common types of digital crime? (Choose all that apply) a.harassment b.cyber-stalking c.embezzlement d.battery
a.harassment b.cyber-stalking c.embezzlement
Policies can address rules for which of the following? a. when you can log on to a company network from home b. the internet sites you can or cannot access c. the amount of personal e-mail you can send d. any of the above
any of the above
What is professional conduct?
standards of behavior