Computer Forensics Chapter 1 HW
Data Recovery
A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?
an affidavit
What does the investigator in a criminal or public-sector case submit, at the request of the prosecuting attorney, if he or she has enough information to support a search warrant?
Misuse of digital assests
What is most often the focus of digital investigations in the private sector?
Prosecution
What is the third stage of a criminal case, after the complaint and the investigation?
It must be notarized
What must be done, under oath, to verify that the information in the affidavit is true?
End User
What term refers to a person using a computer to perform routine tasks other than systems administration?
Authorized Requester
What term refers to the individual who has the power to conduct digital forensic investigations?
Subpoena
When an investigator seeks a search warrant, which of the following must be included in an affidavit to support the allegation of a crime?
Criminal
Which Pacific Northwest agency meets to discuss problems that digital forensics examiners encounter?
IACIS
Which agency introduced training on software for forensics investigations by the early 1990s?
Computer Analysis and Response Team (CART)
Which entity was formed by the FBI in 1984 to handle the increasing number of cases involving digital evidence?
Digital Investigations
Which group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime?
Forensics Investigators
Which group often works as part of a team to secure an organization's computers and networks?
Allegation
Which term refers to an accusation or supposition of fact that a crime has been committed and is made by the complainant, based on the incident?
Privacy
Without a warning banner, what right might employees assume they have when using a company's computer systems and network accesses?