Chapter 1 Flashcards

1
Q

Digital forensics and data recover refer to the same activities.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Police in the United States must use procedures that adhere to which of the following amendments?

A

Fourth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The triad of computing security includes which of the following?

A

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the purpose of maintaining a network of digital forensics specialists?

A

To allow you the ability to cultivate professional relationships with people who specialize in technical area different from your own specialty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Policies can address rules for which of the following? When you can log on to a company network from home, the internet sites you can or can’t access, the amount of personal e-mail you can send

A

All

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List two items that should appear on a warning banner.

A

An organization has the right to monitor what end users do, and their e-mail is not personal and can be monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Under normal circumstances, a private-sector investigator is considered an agent of law enforcement.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List two types of digital investigations typically conducted in a business environment.

A

Espionage, and e-mail harassment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is professional conduct, and why is it important?

A

It helps you remember what procedures were followed if the case ever goes to court. It can also be used as a reference if you need to remember how you solved a previous problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the purpose of an affidavit?

A

To provide a sworn statement of support of facts about evidence of a crime this is submitted to a judge with the request for a search warrant before seizing evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the necessary components of a search warrant?

A

The affidavit is a sworn statement of support of facts about or evidence of a crime which is submitted to a judge with the request for a search warrant before seizing evidence. This includes exhibits (evidence) that support the allegation to justify the warrant. The affidavit is then notarized under sworn oath to verify that the information in the affidavit is true. The affidavit, the warrant, and return of service are basically the order of the procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some ways to determine the resources needed for an investigation?

A

a. Determine the OS of the suspect computer. b. List the necessary software to use for the examination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List three items that should be on an evidence custody form

A

Case number, name of the investigator assigned to the case, nature of the case, location where evidence was obtained, description of the evidence and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why should you do a standard risk assessment to prepare for an investigation?

A

It will help you prepare what materials and tools you will need in order to mitigate the risk of any failure to capture evidence. (To list problems that might happen when conducting your investigation.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You should always prove the allegations made by the person who hired you. T or F?

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

For digital evidence, an evidence bag is typically made of anti static material. True or False?

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why should your evidence media be write-protected?

A

To ensure that data isn’t altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List three items that should be in your case report.

A

An explanation of basic computer and network processes, a narrative of what steps you took, a description of your findings, and log files generated from your analysis tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why should you critique your case after it’s finished?

A

To improve your work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do you call a list of people who have had physical possession of the evidence?

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data collected before an attorney issues a memorandum for an attorney-client privilege case is protected under the confidential work product rule. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation.

A

Triad of computing security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

To provide a sworn statement of support of facts about evidence of a crime this is submitted to a judge with the request for a search warrant before seizing evidence. What is the term?

A

affidavit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a. Determine the OS of the suspect computer. b. List the necessary software to use for the examination.

A

some ways to determine the resources needed for an investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
allegation
a charge made against someone or something before proof has been found
26
a charge made against someone or something before proof has been found
allegation
27
approved secure container is
A fireproof container locked by a key or combination
28
A fireproof container locked by a key or combination
approved secure container
29
attorney-client privilege (ACP)
Communication between an attorney and client about legal matters is protected as confidential communications
30
Communication between an attorney and client about legal matters is protected as confidential communications
attorney-client privilege (ACP)
31
authorized requester
the person who has the right to request an investigation (Private-sector)
32
the person who has the right to request an investigation (Private-sector)
authorized requester
33
bit-stream copy
bit-by-bit duplicate of data on the original storage medium
34
bit-by-bit duplicate of data on the original storage medium
bit-stream copy
35
bit-stream image
the file where the bit-stream copy is stored
36
the file where the bit-stream copy is stored
bit-stream image
37
chain of custody
the route evidence takes from the time the investigator obtains it until the case is closed or goes to court
38
the route evidence takes from the time the investigator obtains it until the case is closed or goes to court
chain of custody
39
Computer Technology Investigators Network (CTIN)
nonprofit group based in Seattle, composed of law enforcement members, private corp security professionals, and other security professionals whose aim is to improve the quality of high technology investigations in the Pacific Northwest.
40
nonprofit group based in Seattle, composed of law enforcement members, private corp security professionals, and other security professionals whose aim is to improve the quality of high technology investigations in the Pacific Northwest.
Computer Technology Investigators Network (CTIN)
41
data recovery
retrieving files that were deleted accidentally or purposefully
42
retrieving files that were deleted accidentally or purposefully
data recovery
43
Digital Evidence First Responder (DEFR)
A professional who secures digital evidence at the scene and ensures its viability while transporting it to the lab.
44
A professional who secures digital evidence at the scene and ensures its viability while transporting it to the lab.
Digital Evidence Firtst Responder (DEFR)
45
Digital Evidence Specialist (DES)
An expert who analyzes digital evidence and determines whether additional specialists are needed.
46
An expert who analyzes digital evidence and determines whether additional specialists are needed.
Digital Evidence Specialist (DES)
47
Digital forensics
Applying investigative procedures for a legal purpose,
48
Applying investigative procedures for a legal purpose
Digital forensics
49
digital investigations
The process of conducting forensic analysis of system suspected of containing evidence related to an incident or a crime
50
The process of conducting forensic analysis of system suspected of containing evidence related to an incident or a crime
digital investigations
51
evidence custody form
A printed form indicating who has signed out and been in physical possession of evidence
52
A printed form indicating who has signed out and been in physical possession of evidence
evidence custody form
53
evidence bags
Nonstatic bags used to transport computer components and other digital devices
54
Nonstatic bags used to transport computer components and other digital devices
evidence bags
55
exculpatory evidence
Evidence that indicates the suspect is innocent of the crime
56
Evidence that indicates the suspect is innocent of the crime
exculpatory evidence
57
exhibits
evidence used in court to prove a case
58
evidence used in court to prove a case
exhibits
59
Fourth Amendment
Must have probable cause for search and seizure
60
Must have probable cause for search and seizure
Fourth Amendment
61
hostile work environment
environment where employees can't perform their assigned duties because of the actions of others.
62
environment where employees can't perform their assigned duties because of the actions of others.
hostile work environment
63
inculpatory evidence
Evidence that indicates a suspect is guilty of the crime with which he or she is charged
64
Evidence that indicates a suspect is guilty of the crime with which he or she is charged
inculpatory evidence
65
industrial espionage
Theft of company sensitive or proprietary company information often to sell to a competitor
66
Theft of company sensitive or proprietary company information often to sell to a competitor
industrial espionage
67
International Association of Computer Investigative Specialists (IACIS)
AN organization created to provide training and software for law enforcement in the digital forensics field
68
AN organization created to provide training and software for law enforcement in the digital forensics field
International Association of Computer Investigative Specialists (IACIS)
69
interrogation
The process of trying to get a suspect to confess to a specific incident or crime
70
The process of trying to get a suspect to confess to a specific incident or crime
interrogation
71
interview
A conversation conducted to collect information from a witness or suspect about specific facts related to an investigation
72
A conversation conducted to collect information from a witness or suspect about specific facts related to an investigation
interview
73
line of authority
The order in which people or positions are notified of a problem; these people or positions have the legal right to initiate an investigation, take posession of evidence, and have access to evidence
74
The order in which people or positions are notified of a problem; these people or positions have the legal right to initiate an investigation, take posession of evidence, and have access to evidence
line of authority
75
multi-evidence form
An evidence custody form used to list all items associated with a case
76
An evidence custody form used to list all items associated with a case
multi-evidence form
77
network intrusion detection and incident response
Detecting attacks from intruders by using automated tools
78
Detecting attacks from intruders by using automated tools
network intrusion detection and incident response
79
professional conduct
Behavior expected of an employee in the workplace or other professional setting
80
Behavior expected of an employee in the workplace or other professional setting
professional conduct
81
repeatable findings
Being able to obtain the same results every time from a digital forensics examination
82
Being able to obtain the same results every time from a digital forensics examination
repeatable findings
83
search and seizure
The legal act of acquiring evidence for an investigation
84
The legal act of acquiring evidence for an investigation
search and seizure
85
search warrants
Legal documents that allow law enforcement to search an office, a home, or other locale for evidence related to an alleged crime
86
Legal documents that allow law enforcement to search an office, a home, or other locale for evidence related to an alleged crime
search warrants
87
single-evidence form
A form that dedicates a page for each item retrieved for a case. It allows investigators to add more detail about exactly what was done to the evidence each time it was taken from the storage locker.
88
A form that dedicates a page for each item retrieved for a case. It allows investigators to add more detail about exactly what was done to the evidence each time it was taken from the storage locker.
single-evidence form
89
verdict
The decision returned by a jury
90
The decision returned by a jury
verdict
91
vulnerability/threat assessment and risk management is what?
The group that determines the weakest points in a system. It covers physical security and the security of OSs and applications.
92
The group that determines the weakest points in a system. It covers physical security and the security of OSs and applications.
vulnerability/threat assessment and risk management
93
warning banner
Text displayed on computer screens when people log on to a company computer; this text states ownership of the computer and specifies appropriate use of the machine or Internet access
94
Text displayed on computer screens when people log on to a company computer; this text states ownership of the computer and specifies appropriate use of the machine or Internet access
warning banner