Chapter 2 Flashcards

1
Q

An employer can be held liable for e-mail harassment.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Building a business case can involve which of the following?

a. Procedures for gathering evidence
b. Testing software
c. Protecting trade secrets

A

All

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ASCLD mandates the procedures established for a computer forensics lab. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The manager of a computer forensics lab is responsible for which of the following? (Choose all that apply.)

a. Necessary changes in lab procedures and software
b. Ensuring that staff members have sufficient training to do the job
c. Knowing the lab objectives
d. None of the above

A

A, B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To determine the types of operating systems needed in your lab, list two sources of information you could use.

A

Uniform Crime Report statistics for your area and a list of cases handled in your area or at your company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What items should your business plan include?

A

Physical security items, such as evidence lockers; how many machines are needed; what OS’s your lab commonly examines; why you need certain software; and how your lab will benefit the company (such as being able to quickly exonerate employees or discover whether they’re guilty)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List two popular certification systems for computer forensics.

A

IAVIS, HTCN, EnCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is physical security so critical for digital forensics labs?

A

Integrity of the evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If a visitor to your computer forensics lab is a personal friend, it’s not necessary to have him or her sign the visitor’s log.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What three items should you research before enlisting in a certification program?

A

Requirements, cost and acceptability in your chosen area of employment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Large computer forensics labs should have at least ____ exits?

A

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typically, a(n) ______ lab has a separate storage area or room for evidence.

A

Regional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer forensics facilities always have windows. True or False?

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Evidence storage containers should have several master keys.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A forensic workstation should always have a direct broadband connection to the Internet. True or False?

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which organization provides good information on safe storage containers?

A

NISPOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which organization has guidelines on how to operate a computer forensics lab?

A

ASCLD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What term refers to labs constructed to shield EMR emissions?

A

TEMPEST

19
Q

American Society of Crime Laboratory Directors (ASCLD)

A

A national society that sets the standards, management, and audit procedures for labs used in crime analysis

20
Q

A national society that sets the standards, management, and audit procedures for labs used in crime analysis

A

American Society of Crime Laboratory Directors (ASCLD)

21
Q

business case

A

A document that provides justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility

22
Q

A document that provides justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility

A

business case

23
Q

Certified Computer Examiner (CCE)

A

A certification from the International Society of Forensic Computer Examiners

24
Q

A certification from the International Society of Forensic Computer Examiners

A

Certified Computer Examiner (CCE)

25
Q

Certified Cyber Forensics Professional (CCFP)

A

A certification from ISC for completing the education and work experience and passing the exam

26
Q

A certification from ISC for completing the education and work experience and passing the exam

A

Certified Cyber Forensics Professional (CCFP)

27
Q

Certified Forensic Computer Examiner (CFCE)

A

A certificate awarded by IACIS at completion

28
Q

A certificate awarded by IACIS at completion

A

Certified Forensic Computer Examiner (CFCE)

29
Q

configuration management

A

The process of keeping track of all upgrades and patches you apply to your computer’s OS and applications

30
Q

The process of keeping track of all upgrades and patches you apply to your computer’s OS and applications

A

configuration management

31
Q

digital forensics lab

A

A lab dedicated to digital investigations

32
Q

A lab dedicated to digital investigations

A

digital forensics lab

33
Q

High Tech Crime Network (HTCN)

A

A national organization that provides certification for computer crime investigators and digital forensics technicians

34
Q

A national organization that provides certification for computer crime investigators and digital forensics technicians

A

High Tech Crime Network (HTCN)

35
Q

Risk Managment

A

The process of determining how much risk is acceptable for any process or operation

36
Q

The process of determining how much risk is acceptable for any process or operation

A

Risk Managment

37
Q

Secure facility

A

A facility that can be locked and allows limited access to the room’s contents

38
Q

A facility that can be locked and allows limited access to the room’s contents

A

Secure facility

39
Q

TEMPEST

A

A term referring to facilities that have been hardened so that no electrical signals from digital devices, computer networks, and telephone systems can’t be monitored or accessed easily by someone outside the facility

40
Q

A term referring to facilities that have been hardened so that no electrical signals from digital devices, computer networks, and telephone systems can’t be monitored or accessed easily by someone outside the facility

A

TEMPEST

41
Q

Uniform Crime Report

A

Information collected at the federal, state, and local levels to determine the types and frequencies of crimes committed.

42
Q

Information collected at the federal, state, and local levels to determine the types and frequencies of crimes committed.

A

Uniform Crime Report

43
Q

IAVIS, HTCN, EnCE

A

two popular certification systems for computer forensics.