Chapter 1: Computer Forensics and Investigations as a Profession

Ace your homework & exams now with Quizwiz!

False

The law of search and seizure protects the rights of all people, excluding people suspected of crimes.

False

Computer investigations and forensics fall into the same category: public investigations.

sliver-platter

Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.

criminal

In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.

affidavit

In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.

authorized requester

In addition to warning banners that state a company's rights of computer ownership, businesses should specify a(n) ____ who has the power to conduct investigations.

prosecution

In general, a criminal case follows three stages: the complaint, the investigation, and the ____.

CTIN

In the Pacific Northwest, ____ meets monthly to discuss problems that law enforcement and corporations face.

exhibits

It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.

objectivity

Maintaining ____ means you must form and sustain unbiased opinions of your cases.

misuse of computing asset

Most computer investigations in the private sector involve ____

line of authority

Published company policies provide a(n) ____ for a business to conduct internal investigations.

Computer Analysis and Response Team (CART)

The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.

computer investigations

The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.

notarized

The affidavit must be ____ under sworn oath to verify that the information in the affidavit is true.

True

To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

line of privacy

Without a warning banner, employees might have an assumed ____ when using a company's computer systems and network accesses.

professional policy

Your ____ as a computer investigation and forensics analyst is critical because it determines your credibility.

Disaster recovery

____ involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring.

Data recovery

____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.

end user

A(n) ____ is a person using a computer to perform routine tasks other than systems administration.

True

After a judge approves and signs a search warrant, it's ready to be executed, meaning you can collect evidence as defined by the warrant.

allegation

Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed.

True

By the 1970s, electronic crimes were increasing, especially in the financial sector.

IACIS

By the early 1990s, the ____ introduced training on software for forensics investigations.

warning banner

A ____ usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will.


Related study sets

Antepartal Care: The Pregnant Client Receiving Prenatal Care

View Set

CompTIA A+ 1101 5.0 Hardware & Network Troubleshooting

View Set