Module 1 Quiz Flashcards
What do you call a list of people who have had physical possession of the evidence?
Evidence log
Evidence record
Affidavit
Chain of custody
Chain of custody
Why should you do a standard risk assessment to prepare for an investigation?
To obtain an affidavit
To discuss the case with the opposing counsel
To obtain a search warrant
To list problems that might happen when conducting an investigation
To list problems that might happen when conducting an investigation
The triad of computing security includes which of the following?
Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation
Detection, response, and monitoring
Vulnerability assessment, detection, and monitoring
Vulnerability assessment, intrusion response, and monitorin
Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation
For digital evidence, an evidence bag is typically made of antistatic material.
True
False
True
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas different from your own specialties in case you need help on an investigation.
True
False
True
You should always prove the allegations made by the person who hired you.
True
False
False
What’s the purpose of an affidavit?
To specify who, what, when, and where—that is, specifics on place, time, items being searched for, and so forth
To determine the OS of the suspect computer and list the software needed for the examination
To list problems that might happen when conducting an investigation
To provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant
To provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant
Police in the United States must use procedures that adhere to which of the following?
Third Amendment
Fourth Amendment
First Amendment
None of the above
Fourth Amendment
You shouldn’t include a narrative of what steps you took in your case report
True
False
False
Embezzlement is a type of digital investigation typically conducted in a business environment.
True
False
True
Why should evidence media be write-protected?
To make image files smaller in size
To comply with Industry standards
To make sure data isn’t altered
To speed up the imaging process
To make sure data isn’t altered
Digital forensics and data recovery refer to the same activities.
True
False
False
Under normal circumstances, a private-sector investigator is considered an agent of law enforcement.
True
False
False
Data collected before an attorney issues a memo for an attorney-client privilege case is protected under the confidential work product rule.
True
False
False
What is one of the necessary components of a search warrant?
Professional codes
Standards of behavior
Professional ethics
Signature of an impartial judicial officer
Signature of an impartial judicial officer