MGMT chapter 2 quiz
`this collaborative support group began as a cooperative effort between the FBI's Cleveland field office and local technology professionals with a focus of protecting critical national infrastructure
infragard
which of the following is NOT an origin used to categorize types of law
intentional
digital forensics can be used for two key purposes
investigate allegations of digital malfeasance; perform root cause analysis
any court can impose its authority over an individual or organization if it can establish which of the following
jurisdiction
another key US federal agency is ___ which is responsible for coordinating directing, and performing highly specialized activities to protect US information systems and produce foreign intelligence information
national security agency
permission to search for evidentiary material at a specified location and/or to seize items to return to the investigation's lab for examination is known as
search warrant
which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, use, or operation of each federal system
the computer security act
sworn testimony that certain facts are in the possession of the investigating officer and that they warrant the examination of specific items located at a specific place is known as
affidavit
the most complex part of an investigation is usually
analysis for potential evidentiary material
which ethical standard is based on the notion that life in community yields a positive outcome for the individuals, requiring each individual to contribute to that community
common good
which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty - or obligation- based ethics
deontological ethics
a process focused on the identification and location of potential evidence related to a specific legal action after it was collected through digital forensics is known as
e-discovery
also known as "items of potential evidentiary value "any information that could potentially support the organization's legal or policy based case against a suspect is known
evidentiary material
the penalties for offenses related to the national information infrastructure protection act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following
for political advantage
which law addresses privacy and security concerns associated with the electronic transmission of PHI
health information technology for economic and clinical health act