Final Exam Flashcards
By the 1970s electronic crimes were increasing especially in the financial sector.
True
To be a successful computer forensics investigator you must be familiar with more than one computing platform.
True
Computer investigations and forensics fall into the same category: public investigations.
False
The law of search and seizure protects the rights of all people excluding people suspected of crimes.
False
After a judge approves and signs a search warrant, it’s ready to be executed, meaning you can collect evidence as defined by the warrant.
True
Maintaining credibility means you must form and sustain unbiased opinions of your cases.
False
The definition of digital forensics has evolved over the years from simply involving securing and analyzing digital information stored on a computer for use as evidence in civil, criminal, or administrative cases.
True
The Fourth Amendment to the U.S. Constitution (and each state’s constitution) protects everyone’s rights to be secure in their person, residence, and property from search and seizure.
True
When you work in the enterprise digital group you test and verify the integrity of standalone workstations and network servers.
False
The police blotter provides a record of clues to crimes that have been committed previously.
True
Which entity was formed by the FBI in 1984 to handle the increasing number of cases involving digital evidence?
Computer Analysis and Response Team (CART)
A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?
Data recovery
Which group often works as part of a team to secure an organization’s computers and networks?
Forensic investigators
Which group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime?
Digital investigations
Which agency introduced training on software for forensics investigations by the early 1990s?
IACIS
Which Pacific Northwest agency meets to discuss problems that digital forensics examiners encounter?
CTIN
Which type of case involves charges such as burglary, murder, or molestation?
Criminal
What is the third stage of a criminal case after the complaint and the investigation?
Prosecution
What does the investigator in a criminal or public-sector case submit at the request of the prosecuting attorney if he or she has enough information to support a search warrant?
Affidavit
When an investigator seeks a search warrant which of the following must be included in an affidavit to support the allegation of a crime?
Probable cause?
What must be done under oath to verify that the information in the affidavit is true?
It must be notarized
What do published company policies provide for a business that enables them to conduct internal investigations?
Line of authority
What usually appears when a computer starts or connects to the company intranet network or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will?
Warning banner
What term refers to a person using a computer to perform routine tasks other than systems administration?
End user