Cengage Chapter 4 - Processing Crime and Incident Scenes Flashcards

1
Q

A computerized system for identifying fingerprints that’s connected to a central database; used to identify criminal suspects and review thousands of fingerprint samples at high speed.

A

Automated Fingerprint Identification System (AFIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data generated by a computer, such as system log files or proxy server logs.

A

computer-generated records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital files generated by a person, such as electronic spreadsheets.

A

computer-stored records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Observing people or places without being detected, often by using electronic equipment, such as video cameras or keystroke/screen capture programs.

A

covert surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A mathematical algorithm that translates a file into a unique hexadecimal value.

A

Cyclic Redundancy Check (CRC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Evidence consisting of information stored or transmitted in electronic form.

A

digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers. This kit should contain two or more types of software or hardware forensics tools, such as extra storage drives.

A

extensive-response field kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A unique hexadecimal value that identifies a file or drive.

A

hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Chemical, biological, or radiological substances that can cause harm to people.

A

hazardous materials (HAZMAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A portable kit containing only the minimum tools needed to perform disk acquisitions and preliminary forensics analysis in the field.

A

initial-response field kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data that doesn’t contribute to evidence of a crime or violation.

A

innocent information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A value created by an encryption utility’s secret key.

A

keyed hash set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wording in a search warrant that limits the scope of a search for evidence.

A

limiting phrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Private-sector cases that require less investigative effort than a major criminal case.

A

low-level investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An algorithm that produces a hexadecimal value of a file or storage media. Used to determine whether data has been changed.

A

Message Digest 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One of the governing bodies responsible for setting standards for some U.S. industries.

A

National Institute of Standards and Technology (NIST)

17
Q

A unique hash number generated by a software tool and used to identify files.

A

nonkeyed hash set

18
Q

Someone who might be a suspect or someone with additional knowledge that can provide enough evidence of probable cause for a search warrant or arrest.

A

person of interest

19
Q

When conducting a search and seizure, objects in plain view of a law enforcement officer, who has the right to be in position to have that view, are subject to seizure without a warrant and can be introduced as evidence. Applied to conducting searches of computers, the plain view doctrine’s limitations are less clear.

A

plain view doctrine

20
Q

The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.

A

probable cause

21
Q

The motivation for law enforcement and other professional personnel to examine an incident or crime scene to see what happened.

A

professional curiosity

22
Q

A group that sets standards for recovering, preserving, and examining digital evidence.

A

Scientific Working Group on Digital Evidence (SWGDE)

23
Q

A forensic hashing algorithm created by NIST to determine whether data in a file or on storage media has been altered. See also National Institute of Standards and Technology (NIST).

A

Secure Hash Algorithm version 1 (SHA-1)

24
Q

Detecting data transmissions to and from a suspect’s computer and a network server to determine the type of data being transmitted over a network.

A

sniffing