meh Flashcards

1
Q

This involves recovering information that could have been deleted by mistake or lost during a power outage for example.

A

data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is the process of obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases.

A

Computer forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This kind of investigation usually involves criminal cases and government agencies

A

public investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This refers to the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence

A

chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The witness or victim is often referred to as this. He or she makes an allegation to the police (an accusation or supposition of fact that a crime has been committed).

A

Complainant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a sworn statement of support of facts about or evidence of a crime is submitted to a judge with the request for a search warrant before seizing evidence.

A

affidavit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Police officers may have different _____ of expertise or certifications.

A

levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your professional ______ as a computer investigation and forensics analyst is critical because it determines your credibility. Professional _____ includes ethics, morals, and standards of behavior. Note: it’s the same word twice.

A

conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Part of the evidence gathering process involves keeping a form called an ___________ form.

A

evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To secure and catalog the evidence contained in large computer components, you can use large ______ bags, tape, tags, labels, and other products available from police supply

A

evidence bags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a bit-by-bit copy (also known as a sector copy) of the original drive or storage medium and is an exact duplicate.

A

Bit-stream copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The target disk that is used to copy evidence data should be at least _______ the size of the evidence disk

A

1.5x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is the acronym of the name of Windows 8’s file-system

A

ReFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

At minimum, a forensics lab should have a __________ log listing people who have accessed the lab

A

visitor’s log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _______ ______ plan ensures that you can restore your forensic lab’s workstations and file servers to their original condition if a catastrophic failure occurs.

A

disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The process of recording all updates made on a lab’s workstations is called __________ management.

A

config/change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This storage format is a universal format that is fast and is able to ignore minor data read errors on a source drive.

A

raw format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

One can validate digital evidence using a ________ algorithm such as MD5 or SHA-1

A

hashing

19
Q

This RAID level is made up of two disks and if one drive fails, the OS switches to the other disk. The contents on the two disks is identical.

A

raid-1

20
Q

Only ______ person (how many?) should collect and catalog digital evidence at a crime scene or lab.

A

1

21
Q

________ is an out-of-court statement that is offered to prove the truth of the matter asserted in the statement.

A

hearsay

22
Q

To establish authorship of digital evidence in some cases, attorneys can use __________ evidence, which requires finding other clues associated with the suspect’s computer or location.

A

circumstantial

23
Q

________ cause refers to the standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.

A

probable

24
Q

This is the file system that was commonly used in Windows 95, 98, Me, 200, XP, and Vista. Disks could be as large as 2TB.

A

fat-32

25
Q

When Microsoft introduced Windows 2000, it added built-in encryption to NTFS called this

A

Encrypting File System (EFS)

26
Q

When a laptop, smartphone, or other digital device is retrieved, its contents are unknown and pose a challenge to the examiner. The evidence can be __________ evidence (in criminal cases, the expression is “incriminating”) or ________ evidence, meaning it tends to clear the suspect.

A

Inculpatory and exculpatory

27
Q

The witness or victim (often referred to as the “complainant”) makes an______ to the police, an accusation or supposition of fact that a crime has been committed.

A

Allegation

28
Q

The most important policies are those defining the rules for using the company’s computers and networks; this type of policy is commonly known as an “______ ___ policy.”

A

Acceptable use

29
Q

Another way a private or public organization can avoid litigation is to display a warning ______ on computer screens

A

Banner

30
Q

Data acquisition is the task of collecting digital evidence from electronic media. There are two types:

A

static and live

31
Q

When confidential business data gets included with the criminal evidence, this data is referred to as __________ data.

A

Commingled

32
Q

The ___ command, available on all UNIX and Linux distributions means “data dump.” This command has many functions such copying an entire device (all data files, slack space, and free space). It creates a raw format that most forensics tools can read. Most forensics tools have this command built in already.

A

dd

33
Q

The _____ Amendment to the U.S. Constitution (and each state’s constitution) protects everyone’s rights to be secure in their person, residence, and property from search and seizure, for example.

A

fourth

34
Q

All updates done to workstations in a lab should be recorded by using a process called __________ management.

A

Configuration

35
Q

A _______ acquisition captures only specific files of interest to the case or specific types of files

A

Logical

36
Q

This is the ISO standard for Digital Forensics

A

27037?

37
Q

A regulation intended to strengthen and unify data protection for all individuals within the EU and addresses the export of personal data outside the EU

A

GDPR

38
Q

This type (grade) of forensics lab has the highest security and is the most expensive. It can block computer emanation among other things.

A

Tempest

39
Q

This exception allows “records of regularly conducted activity,” such as business memos, reports, records, or data compilations. Generally, computer records are considered admissible if they qualify as a business record.

A

Business-record exception

40
Q

This rule states that to prove the content of a written document, recording, or photograph, ordinarily the original writing, recording, or photograph is required.

A

The best evidence rule

41
Q

The _____ _____ doctrine states that objects falling in the direct sight of an officer who has the right to be in a location are subject to seizure without a warrant and can be introduced into evidence.

A

plain view doctrine

42
Q

This is the unused portion of the hard drive.

A

Unallocated space

43
Q

This is the unused space that is created between the end-of-file marker and the end of the hard drive cluster in which the file is stored.

A

File slack or slack space