Chapter 19 Flashcards

1
Q

_______ may result in charging
suspects with a crime and the prosecution of those charges in criminal court.

Operational Investigations
Criminal Investigations
Civil Investigations
Regulatory Investigations

A

Criminal Investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______ when they believe that an
individual or corporation has violated administrative law.

Operational Investigations
Criminal Investigations
Civil Investigations
Regulatory Investigations

A

Regulatory Investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ simply requires that the evidence demonstrate that the outcome of the case is more likely
than not.

Operational Investigations
Criminal Investigations
Civil Investigations
Regulatory Investigations

A

Civil Investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_______ have the loosest standards for collection of information.

A

Operational Investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

three of these requirements for evidence to be admissible:

A
  1. The evidence must be relevant to determining a fact.
  2. The fact that the evidence seeks to determine must be material (that is, related) to the case.
  3. The evidence must be competent, meaning it must have been obtained legally. Evidence that results from an illegal search would be inadmissible because it is not
    competent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when a document is used as evidence in a court proceeding, the original document must be introduced is :

best evidence rule
parol evidence rule

A

best evidence rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

when an agreement between parties is put into written form, the written document is assumed to contain all the terms of the agreement and no verbal agreements may modify the written agreement.

best evidence rule
parol evidence rule

A

parol evidence rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Consists of things that may actually be brought into a court of law.

real evidence
documentary evidence
testimonial evidence

A

real evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This type of evidence must also be authenticated.

real evidence
documentary evidence
testimonial evidence

A

documentary evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

______ must meet the materiality, competency, and relevancy requirements
and also complies with the best evidence and parol evidence rules, it can be admitted into court.

real evidence
documentary evidence
testimonial evidence

A

documentary evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ of most witnesses must be strictly limited to direct evidence based on the witness’s factual observations.

real evidence
documentary evidence
testimonial evidence

A

testimonial evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the ______ process facilitates the processing of electronic information for disclosure.

A

electronic discovery

or eDiscovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

has a negative outcome affecting the confidentiality, integrity, or availability of an organization’s data

Event
Incident

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any occurrence that takes place during a certain period of time

Event
Incident

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The most common reason incidents are not reported is that they _____.

A

are never identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ attacks are reconnaissance attacks that usually precede another, more serious attack.

Scanning
Compromises
Malicious code
Denial of service

A

Scanning

17
Q

_____ is any unauthorized access to the system or information the system
stores.

Scanning
Compromises
Malicious code
Denial of service

A

Compromises

18
Q

A user or automated tool reports that one or more services (or the entire
machine) are unavailable

A

Denial of Service