Forensics

Ace your homework & exams now with Quizwiz!

For Windows XP, 2000, and NT servers and workstations, RAID 0 or ____ is available.

1

The EMR from a computer monitor can be picked up as far away as ____ mile.

1/2

What are the four levels cf certification offered by HTCN?

1> Certified Computer Crime Investigator (Basic) 2) Cert-f^ed Computer Crime Investigator (Advanced) 3) Certified Computer Forensic Technician (Basic) 4) Certified Computer Forensic Technician (Advanced)

IACIS requires recertification every ____ years to demonstrate continuing work in the field of computer forensics

3

Computing components are designed to last 18 to ____ months in normal business operations

36

Image files can be reduced by as much as ____% of the original when using lossless compression.

50%

When recovering evidence from a contaminated crime scene, if the temperature in the contaminated room is higher than ____ degrees, you should take measures to avoid damage to the drive from overheating.

80

What are the advantages and disadvantages of using Windows acquisition tools?

Advantages Make acquiring evidence from a suspect drive more convenient Especially when used with hot-swappable devices• Disadvantages Must protect acquired data with a well-tested write-blocking hardware deviceTools can't acquire data from a disk's host protected area

In the Pacific Northwest, ____ meets to discuss problems that digital forensics examiners encounter.

CTIN

What HTCN certification level requires candidates have three years of experience in computing investigations for law enforcement or corporate cases?

Certified Computer Forensic Technician, Basic

____ records are data the system maintains, such as system log files and proxy server logs.

Computer-generated

In a ____ case, a suspect is charged for a criminal offense, such as burglary, murder, or molestation.

Criminal

involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.

Data recovery

The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.

Digital Investigation

A ____ plan also specifies how to rebuild a forensic workstation after it has been severely contaminated by a virus from a drive you're analyzing.

Disaster Recovery Plan

Older Microsoft disk compression tools, such as DoubleSpace or ____, eliminate only slack disk space between files.

DriveSpace

Certain files, such as the ____ and Security log in Windows XP, might lose essential network activity records if the power is terminated without a proper shutdown.

Event Log

It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.prosecutionreportsexhibitslitigation"

Exhibits

ISPs can investigate computer abuse committed by their customers.

FALSE

Computer investigations and forensics fall into the same category: public investigations.

False

For daily work production, several examiners can work together in a large open area, as long as they all have different levels of authority and access needs.

False

Maintaining credibility means you must form and sustain unbiased opinions of your cases.

False

The most common and time-consuming technique for preserving evidence is creating a duplicate copy of your evidence image file.

False

often work as part of a team to secure an organization's computers and networks.

Forensics Investigator

) Explain the use of hash algorithms to verify the integrity of lossless compressed data.

Hash algorithms are taken before and after an investigation. The purpose of a hash algorithm is to ensure that data was not lost or changed during an investigation. If the hash numbers are the same before and after, then the data has not been altered.

Most federal courts that evaluate digital evidence from computer-generated records assume that the records contain _

Hearsay

1. Illustrate with an example the problems caused by commingled data.

If someone kept files pertaining to the sale of illicit goods next to the company's new drone design plans. The drone design plans have been commingled with contraband so now you must report the crime to the police as required by many state's laws.

Describe how to use a journal when processing a major incident or crime scene.

Keep a journal to document your activities. Include the date and time you arrive on the scene, the people you encounter, and notes on every important task you perform. Update the journal as you process the scene. With mobile devices, you can easily record a log of what you're doing; just be sure to check who has access to your mobile device.

Discuss the use of a laptop PC as a forensic workstation

Laptops are good for investigations because they can brought to crime scenes to retrieve evidence. Lap tops are still limited on what they can do because the size of their processor. The better the processor the quicker

Autopsy uses ____ to validate an image.

MD5

llustrate a proper way of disposing materials on your computer investigation lab.

Maintain two separate trash containers, one to store items unrelated to an investigation, such as discarded CDs cr magnetic tapes, and the other for sensitive material that requires special handling to ensure that it's destroyed. Using separate trash containers maintains the integrity of criminal investigation processes and protects trade secrets and attornev-client privileged communications in a private corporation. Several commercially bonded firms specialize in disposing of sensitive materials. Ycur lab shculd have access to these services to maintain the integrity of your investigations.

The ____ command displays pages from the online help manual for information on Linux commands and their options.

Man

Windows hard disks can now use a variety of file systems, including FAT16, FAT32, ____, and Resilient File System

NTFS

Floors and carpets on your computer forensic lab should be cleaned at least ____ a week to help minimize dust that can cause static electricity.

Once

Briefly describe the main characteristics of private investigations.

Private or corporate investigations deal with private companies, non-law-enforcement government agencies, and lawyers. These private organizations aren't governed directly by criminal law or Fourth Amendment issues, but by internal policies that define expected employee behavior and conduct in the workplace. Private corporate investigations also involve litigation disputes. Although private investigations are usually conducted in civil cases, a civil case can escalate into a criminal case, and a criminal case can be reduced to a civil case. If you follow good forensics procedures, the evidence found in your investigations can easily make the transition between civil and criminal cases.

In ____, two or more disk drives become one large volume, so the computer views the disks as a single disk.

RAID 0

Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.

Silver-Platter

What are the duties of a lab manager?

The lab manager sets up processes for managing cases and also reviews cases. They also plan updates for the lab. The lab manager is also in charge of promoting quality assurance for the lab like specific steps for when cases are received.

A forensics analysis of a 6 TB disk, for example, can take several days or weeks.

True

A judge can exclude evidence obtained from a poorly worded warrant.

True

A separate manual validation is recommended for all raw acquisitions at the time of analysis.

True

Acquisitions of RAID drives can be challenging and frustrating for digital forensics examiners because of how RAID systems are:

True

After a judge approves and signs a search warrant, it's ready to be executed, meaning you can collect evidence as defined by the warrant.

True

By the 1970s, electronic crimes were increasing, especially in the financial sector

True

By using marketing to attract new customers or clients, you can justify future budgets for the lab's operation and staff.

True

FTK Imager requires that you use a device such as a USB dongle for licensing.

True

If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is not available.

True

In Autopsy and many other forensics tools raw format image files don't contain metadata.

True

Maintaining credibility means you must form and sustain unbiased opinions of your cases.

True

The Fourth Amendment to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.

True

The most common and time-consuming technique for preserving evidence is creating a duplicate copy of your evidence image file.

True

There's no simple method for getting an image of a RAID server's disks.

True

a separate manual validation is recommended for all raw acquisitions at the time of analysis

True

Briefly describe the triad that makes up computer security

Vulnerability assessment and risk management * Network intrusion detection and incident response * Computer investigations

Law enforcement investigators need a(n) ____ to remove computers from a crime scene and transport them to a lab.

Warrant

What questions should an investigator ask to determine whether a computer crime was committed

What was the tool used to commit the crime? Was it a simple trespass? Was it a theft, a burglary, or vandalism?

During an investigation involving a live computer, do not cut electrical power to the running system unless it's an older ____ or MS-DOS system

Windows

In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.

affidavit

In the ____, you justify acquiring newer and better resources to investigate digital forensics cases.

business case

Confidential business data included with the criminal evidence are referred to as ____ data.

commingled

In addition to performing routine backups, record all the updates you make to your workstation by using a process called ____ when planning for disaster recovery.

configuration management

If your time is limited, consider using a logical acquisition or ____ acquisition data copy method.

consider using a logical acquisition or ____ acquisition data copy method. sparse

A ____ is where you conduct your investigations, store evidence, and do most of your work.

digital forensics lab

A(n) ____ is a person using a computer to perform routine tasks other than systems administration.

end user

Plain view doctrine

exception to the Fourth Amendment's warrant requirement that allows an officer to seize evidence and contraband that are found in plain view

If the computer has an encrypted drive, a live acquisition is done if the password or passphrase is not available.

false

The law of search and seizure protects the rights of all people, excluding people suspected of crimes.

false

One way to investigate older and unusual computing systems is to keep track of ____ that you can find through an online search.

forums and blogs

Authorized requeste

is the person who can request for investigation during crime.. such as the chief security officer or chief intelligence officer

Most digital investigations in the private sector involve ____.

misuse of digital assets

Investigating and controlling computer incident scenes in private-sector environments is ____ in crime scenes.

much easier than

____ is the standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.

probable cause

Evidence is commonly lost or corrupted through ____, which involves police officers and other professionals who aren't part of the crime scene processing team.

professional curiosity

One major disadvantage of ____ format acquisitions is the inability to share an image between different vendors' computer forensics analysis tools.

proprietary

or mirrored striping, is a combination of RAID 1 and RAID 0

raid 10

Current distributions of Linux include two hashing algorithm utilities: md5sum and

sha1sum

Real-time surveillance requires ____ data transmissions between a suspect's computer and a network server.

sniffing

A secure storage container or cabinet should be made of ____ and include an internal cabinet lock or external padlock.

steel

If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have an expectation of privacy.

true

Some acquisition tools don't copy data in the host protected area (HPA) of a disk drive

true

A ____ usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will.

warning banner


Related study sets

Chapter 11: Community Mental Health

View Set

Pelvic Limb & Lymph App Questions

View Set

Chapter 1 quiz 1 Public Health for educated people

View Set

Інструкція з надання першої допомоги постраждалим в зв'язку з нещасними випадками .... М-1987р. 2021

View Set

System Analysis and Design: Project Management Chapter 2

View Set

Chapter 7 - Vision: From Eye to Brain

View Set

Equipment II- Lecture 15 (Fluoroscopy)

View Set