1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Digital forensics and data recovery refer to the same activities. True or False?
a. True
b. False
a. True
Criminal proceedings in the United States must use procedures that adhere to which of the following?
a. Third Amendment
b. Fourth Amendment
c. First Amendment
d. None of these choices
b. Fourth Amendment
The triad of computing security includes which of the following?
a. Detection, response, and monitoring
b. Vulnerability assessment, detection, and monitoring
c. Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation
d. Vulnerability assessment, intrusion response, and monitoring
c. Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation
Policies can address rules for which of the following?
a. When you can log on to a company network from home
b. The Internet sites you can or can't access
c. The amount of personal email you can send
d. All of these choices
d. All of these choices
A warning banner should contain information about ____________.
a. who can use the site
b. who owns the computer
c. the content of websites
d. consequences of misuse
a. who can use the site
Under normal circumstances, a private-sector investigator is considered an agent of law enforcement. True or False?
a. True
b. False
b. False
When collecting computer components as evidence, you should place them in antistatic bags. True or False?
a. True
b. False
a. True
What term do you use to refer to all the people who have had physical possession of the evidence?
a. Professional investigators
b. Chain of custody
c. Legal custody
d. Physical tracking
b. Chain of custody
Data collected before an attorney issues a memo for an attorney-client privilege case is protected under the confidential work product rule. True or False?
a. True
b. False
b. False