Chapter 2 Flashcards
An employer can be held liable for e-mail harassment.
T
Building a business case can involve which of the following?
a. Procedures for gathering evidence
b. Testing software
c. Protecting trade secrets
All
The ASCLD mandates the procedures established for a computer forensics lab. True or False?
False
The manager of a computer forensics lab is responsible for which of the following? (Choose all that apply.)
a. Necessary changes in lab procedures and software
b. Ensuring that staff members have sufficient training to do the job
c. Knowing the lab objectives
d. None of the above
A, B, C
To determine the types of operating systems needed in your lab, list two sources of information you could use.
Uniform Crime Report statistics for your area and a list of cases handled in your area or at your company.
What items should your business plan include?
Physical security items, such as evidence lockers; how many machines are needed; what OS’s your lab commonly examines; why you need certain software; and how your lab will benefit the company (such as being able to quickly exonerate employees or discover whether they’re guilty)
List two popular certification systems for computer forensics.
IAVIS, HTCN, EnCE
Why is physical security so critical for digital forensics labs?
Integrity of the evidence.
If a visitor to your computer forensics lab is a personal friend, it’s not necessary to have him or her sign the visitor’s log.
F
What three items should you research before enlisting in a certification program?
Requirements, cost and acceptability in your chosen area of employment.
Large computer forensics labs should have at least ____ exits?
Two
Typically, a(n) ______ lab has a separate storage area or room for evidence.
Regional
Computer forensics facilities always have windows. True or False?
F
Evidence storage containers should have several master keys.
T
A forensic workstation should always have a direct broadband connection to the Internet. True or False?
F
Which organization provides good information on safe storage containers?
NISPOM
Which organization has guidelines on how to operate a computer forensics lab?
ASCLD