Chapter 2 Flashcards
An employer can be held liable for e-mail harassment.
T
Building a business case can involve which of the following?
a. Procedures for gathering evidence
b. Testing software
c. Protecting trade secrets
All
The ASCLD mandates the procedures established for a computer forensics lab. True or False?
False
The manager of a computer forensics lab is responsible for which of the following? (Choose all that apply.)
a. Necessary changes in lab procedures and software
b. Ensuring that staff members have sufficient training to do the job
c. Knowing the lab objectives
d. None of the above
A, B, C
To determine the types of operating systems needed in your lab, list two sources of information you could use.
Uniform Crime Report statistics for your area and a list of cases handled in your area or at your company.
What items should your business plan include?
Physical security items, such as evidence lockers; how many machines are needed; what OS’s your lab commonly examines; why you need certain software; and how your lab will benefit the company (such as being able to quickly exonerate employees or discover whether they’re guilty)
List two popular certification systems for computer forensics.
IAVIS, HTCN, EnCE
Why is physical security so critical for digital forensics labs?
Integrity of the evidence.
If a visitor to your computer forensics lab is a personal friend, it’s not necessary to have him or her sign the visitor’s log.
F
What three items should you research before enlisting in a certification program?
Requirements, cost and acceptability in your chosen area of employment.
Large computer forensics labs should have at least ____ exits?
Two
Typically, a(n) ______ lab has a separate storage area or room for evidence.
Regional
Computer forensics facilities always have windows. True or False?
F
Evidence storage containers should have several master keys.
T
A forensic workstation should always have a direct broadband connection to the Internet. True or False?
F
Which organization provides good information on safe storage containers?
NISPOM
Which organization has guidelines on how to operate a computer forensics lab?
ASCLD
What term refers to labs constructed to shield EMR emissions?
TEMPEST
American Society of Crime Laboratory Directors (ASCLD)
A national society that sets the standards, management, and audit procedures for labs used in crime analysis
A national society that sets the standards, management, and audit procedures for labs used in crime analysis
American Society of Crime Laboratory Directors (ASCLD)
business case
A document that provides justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility
A document that provides justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility
business case
Certified Computer Examiner (CCE)
A certification from the International Society of Forensic Computer Examiners
A certification from the International Society of Forensic Computer Examiners
Certified Computer Examiner (CCE)