Forensic Fundamentals Flashcards

1
Q

18 USC § 1029

A

Cannot use a computer to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

18 USC § 1030

A

Computer Fraud and Abuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ECPA

A

Electronic Communications Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CALEA

A

Communications Assistance for Law Enforcement Aid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the ECPA Dictate

A

Cannot intercept unauthorizated communications through electronic means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the CALEA dictate

A

Allows police to surveil digital communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EEA

A

Economic Esponiage Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the EEA say?

A

Cannot steal trade secrets even commercially

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rule 402

A

Test for Relevant Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rule 502

A

Attorney-client privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rule 702

A

Testimony by expert witness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rule 902

A

Evidence that is self authenticating (hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rule 1002

A

Provide only the best evidence (the original)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rule 1003

A

Admissibility of exact duplicates (“forensically sound”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Forensically sound image

A
  • Exact representation
  • Hashing process
  • Audit trail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The digital forensic process

A
  • Identification
  • Preservation
  • Collection
  • Examination
  • Analysis
  • Presentation
17
Q

Functional Investigation Methodology

A

Jk

18
Q

Cyber Kill Chain

A

Recon
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on Objectives