Module 1 Quiz Flashcards

1
Q

What do you call a list of people who have had physical possession of the evidence?

Evidence log

Evidence record

Affidavit

Chain of custody

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why should you do a standard risk assessment to prepare for an investigation?

To obtain an affidavit

To discuss the case with the opposing counsel

To obtain a search warrant

To list problems that might happen when conducting an investigation

A

To list problems that might happen when conducting an investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The triad of computing security includes which of the following?

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation

Detection, response, and monitoring

Vulnerability assessment, detection, and monitoring

Vulnerability assessment, intrusion response, and monitorin

A

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For digital evidence, an evidence bag is typically made of antistatic material.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas different from your own specialties in case you need help on an investigation.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You should always prove the allegations made by the person who hired you.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the purpose of an affidavit?

To specify who, what, when, and where—that is, specifics on place, time, items being searched for, and so forth

To determine the OS of the suspect computer and list the software needed for the examination

To list problems that might happen when conducting an investigation

To provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant

A

To provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Police in the United States must use procedures that adhere to which of the following?

Third Amendment

Fourth Amendment

First Amendment

None of the above

A

Fourth Amendment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You shouldn’t include a narrative of what steps you took in your case report

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Embezzlement is a type of digital investigation typically conducted in a business environment.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why should evidence media be write-protected?

To make image files smaller in size

To comply with Industry standards

To make sure data isn’t altered

To speed up the imaging process

A

To make sure data isn’t altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital forensics and data recovery refer to the same activities.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Under normal circumstances, a private-sector investigator is considered an agent of law enforcement.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data collected before an attorney issues a memo for an attorney-client privilege case is protected under the confidential work product rule.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one of the necessary components of a search warrant?

Professional codes

Standards of behavior

Professional ethics

Signature of an impartial judicial officer

A

Signature of an impartial judicial officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Policies can address rules for which of the following?

When you can log on to a company network from home

The Internet sites you can or can’t access

The amount of personal e-mail you can send

Any of the above

A

Any of the above

17
Q

Why should you critique your case after it’s finished?

To improve your work

To list problems that might happen when conducting an investigation

To maintain chain of custody

To maintain a professional conduct

A

To improve your work

18
Q

List three items that should be on an evidence custody form.

Name of the investigator, affidavit and name of the judge assigned to the case

Affidavit, search warrant, and description of the evidence

Description of the evidence, location of the evidence and search warrant

Case number, name of the investigator and nature of the case

A

Case number, name of the investigator and nature of the case

19
Q

Why is professional conduct important?

It saves a company from using warning banners

It helps with an investigation

It includes ethics, morals, and standards of behavior

All of the above

A

It includes ethics, morals, and standards of behavior

20
Q

One way to determine the resources needed for an investigation is based on the OS of the suspect computer, list the software needed for the examination.

True

False

A

True

21
Q

A warning banner should never state that the organization has the right to monitor what users do.

True

False

A

False