Chapter 1: Computer Forensics and Investigations as a Profession
False
The law of search and seizure protects the rights of all people, excluding people suspected of crimes.
False
Computer investigations and forensics fall into the same category: public investigations.
sliver-platter
Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.
criminal
In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.
affidavit
In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.
authorized requester
In addition to warning banners that state a company's rights of computer ownership, businesses should specify a(n) ____ who has the power to conduct investigations.
prosecution
In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
CTIN
In the Pacific Northwest, ____ meets monthly to discuss problems that law enforcement and corporations face.
exhibits
It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.
objectivity
Maintaining ____ means you must form and sustain unbiased opinions of your cases.
misuse of computing asset
Most computer investigations in the private sector involve ____
line of authority
Published company policies provide a(n) ____ for a business to conduct internal investigations.
Computer Analysis and Response Team (CART)
The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.
computer investigations
The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.
notarized
The affidavit must be ____ under sworn oath to verify that the information in the affidavit is true.
True
To be a successful computer forensics investigator, you must be familiar with more than one computing platform.
line of privacy
Without a warning banner, employees might have an assumed ____ when using a company's computer systems and network accesses.
professional policy
Your ____ as a computer investigation and forensics analyst is critical because it determines your credibility.
Disaster recovery
____ involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring.
Data recovery
____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.
end user
A(n) ____ is a person using a computer to perform routine tasks other than systems administration.
True
After a judge approves and signs a search warrant, it's ready to be executed, meaning you can collect evidence as defined by the warrant.
allegation
Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed.
True
By the 1970s, electronic crimes were increasing, especially in the financial sector.
IACIS
By the early 1990s, the ____ introduced training on software for forensics investigations.
warning banner
A ____ usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will.