cit 361 quiz week 1
What usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will? a. A warning banner b. A statement of responsibilities c. An alarm trigger d. A consent authorization
A
Without a warning banner, what right might employees assume they have when using a company's computer systems and network accesses? a. Authority b. Privacy c. Consent d. Anonymity
B
What term refers to a person using a computer to perform routine tasks other than systems administration? a. Complaintant b. Consumer c. End user d. Customer
C
Which type of case involves charges such as burglary, murder, or molestation? a. Corporate b. Civil c. Criminal d. Judicial
C
What do published company policies provide for a business that enables them to conduct internal investigations? a. Absolute process b. Judicial authorization c. Legitimate justification d. Line of authority
D
Computer investigations and forensics fall into the same category: public investigations. (true/false)
false
When you work in the enterprise digital group, you test and verify the integrity of standalone workstations and network servers. (true/false)
false
Maintaining credibility means you must form and sustain unbiased opinions of your cases. (True/false)
true
The definition of digital forensics has evolved over the years from simply involving securing and analyzing digital information stored on a computer for use as evidence in civil, criminal, or administrative cases. (true/false)
true
To be a successful computer forensics investigator, you must be familiar with more than one computing platform. (true/false)
true