Computer Forensics Chapter 2

Ace your homework & exams now with Quizwiz!

Large digital forensics labs should have at least ________ exits. a. 2 b. 5 c. 4 d. 7

a. 2

An employer can be held liable for e-mail harassment. a. True b. False

a. True

Your business plan should include physical security items. a. true b. false

a. true

Which organization has guidelines on how to operate a digital forensics lab? a. NISPOM b. ANAB c. TEMPEST d. SCADA

b. ANAB

Evidence storage containers should have several master keys. a. True b. False

b. False

The ANAB mandates the procedures established for a digital forensics lab. a. True b. False

b. False

What term refers to labs constructed to shield EMR emissions? a. ASQ b. TEMPEST c. NISPOM d. SCADA

b. TEMPEST

A forensic workstation should always have a direct broadband connection to the Internet. a. true b. false

b. false

ASQ and ANAB are two popular certification programs for digital forensics. a. true b. false

b. false

Digital forensics facilities always have windows. a. true b. false

b. false

If a visitor to your digital forensics lab is a personal friend, it's not necessary to have him or her sign the visitor's log. a. true b. false

b. false

Which organization provides good information on safe storage containers? a. ASCLD b. ASQ c. NISPOM d. TEMPEST

c. NISPOM

Building a business case can involve which of the following? a. Procedures for gathering evidence b. Testing software c. Protecting trade secrets d. All of the above

d. All of the above

To determine the types of operating systems needed in your lab, list two sources of information you could use. a. ANAB and IACIS b. EnCE and ACE c. Uniform Crime Report statistics and a list of cases handled in your area d. Local police reports and ISFCE reports

c. Uniform Crime Report statistics and a list of cases handled in your area

Why is physical security so critical for digital forensics labs? a. To ensure continuous funding b. To make sure unwanted data isn't retained on the drive c. To protect trade secrets d. To prevent data from being lost, corrupted, or stolen

d. To prevent data from being lost, corrupted, or stolen

The manager of a digital forensics lab is responsible for which of the following? a. ensuring that staff members have enough training to do the job b. knowing the lab objectives c. making necessary changes in lab procedures and software d. all of the above

d. all of the above

Before enlisting in a certification program, thoroughly research the requirements, ________, and acceptability in your area of employment. a. business hours b. number of students c. location d. cost

d. cost

Typically, a(n) ________ lab has a separate storage area or room for evidence. a. federal b. research c. state d. regional

d. regional


Related study sets

Chapter 62: Management of Patients with Burn Injury

View Set

Las Casas Question US History ERS

View Set

Ch. 3 Optimization: Doing the Best You Can

View Set

Experimental Psyc Test 3 Chapter 7

View Set

ITIL 4 Foundation Practice Exam 4

View Set

Reading 4: Common Probability Distribution

View Set