Understanding the Digital Forensics Profession and Investigations Flashcards

1
Q

U.S. Constitution; Protects everyone’s rights to be secure in their person, residence, and property from search and seizure.

A

Fourth Amendment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Legal document authorizing a police officer or other official to enter and search a premise.

A

Search warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Different from digital forensics; Involves retrieving information that was deleted by mistake or lost during a power surge or server crash, for example.

A

Data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Evidence that is incriminating.

A

Inculpatory evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Evidence that tends to clear the suspect

A

Exculpatory evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Investigations triad

A
  1. Vulnerability/Threat Assessment and Risk Management
  2. Network Intrusion Detection and Incident Response
  3. Digital Investigations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Part of investigations triad where you test and verify the integrity of stand-alone workstations and network servers.

A

Vulnerability/Threat Assessment and Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Part of the investigations triad that detects intruder attacks by using automated tools and monitoring network firewall logs

A

Network Intrusion Detection and Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Part of the investigations triad that manages investigations and conducts forensics analysis of systems suspected of containing evidence related to an incident or crime.

A

Digital Investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Introduced training on software for digital forensics examinations.

A

International Association of Computer Investigative Specialists (IACIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A nonprofit group that meets to discuss problems that digital forensics examiners encounter.

A

Computer Technology Investigators Network (CTIN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An accusation of fact that a crime has been committed.

A

Allegation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Has the skill and training to arrive at an incident scene, assess the situation, and take precautions to acquire and preserve evidence.

A

Digital Evidence First Responder (DEFR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Has the skill to analyze the data and determine when another specialist should be called in to assist with the analysis.

A

Digital Evidence Specialist (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sworn statement of support of facts about or evidence of a crime that is submitted to a judge with a request for a search warrant.

A

Affidavit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Support the allegation to justify the warrant

A

Exhibits (evidence)

17
Q

Involves selling sensitive or confidential company information to a competitor.

A

Industrial espionage

18
Q

Involves crimes such as falsification of data, embezzlement, and sabotage

A

White-collar crimes

19
Q

Part of company policies that states who has the legal right to initiate an investigation, who can take possession of evidence, and who can have access to evidence.

A

Line of authority

20
Q

Usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end-users that the organization reserves the right to inspect computer systems and network traffic at will

A

Warning banner

21
Q

Has the power to initiate investigations, specified by the business.

A

Authorized requester

22
Q

Three types of situations that are common in private-sector environments.

A
  1. Abuse or misuse of digital assets
  2. E-mail abuse
  3. Internet abuse
23
Q

The route evidence takes from the time you find it until the case is closed or goes to court.

A

Chain of custody

24
Q

Helps you document what has and has not been done with the original evidence and forensic copies of the evidence.

A

Evidence custody form

25
Q

Specially configured PC loaded with additional bays and forensics software.

A

Forensic workstation

26
Q

Bit-by-bit copy of the original drive or storage medium and is an exact duplicate.

A

Bit-stream copy

27
Q

File containing the bit-stream copy of all data on a disk or disk partition.

A

Bit-stream image