ISTC2071 - Computer Forensics Chapter 1 Study Guide

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Which entity was formed by the FBI in 1984 to handle the increasing number of
cases involving digital evidence?

Computer Analysis and Response Team

2
New cards

A technician is trying to recover information on a computer that has been hidden or
deleted on purpose in order to hide evidence of a crime. Which type of task is the
technician performing?

Data recovery

3
New cards

Which group often works as part of a team to secure an organization's computers
and networks?

Forensics investigators

4
New cards

Which group manages investigations and conducts forensic analysis of systems
suspected of containing evidence related to an incident or a crime?

Digital investigations

5
New cards

Which agency introduced training on software for forensics investigations by the
early 1990s?

IACIS

6
New cards

Which Pacific Northwest agency meets to discuss problems that digital forensics
examiners encounter?

CTIN

7
New cards

Which type of case involves charges such as burglary, murder, or molestation?

Criminal

8
New cards

What is the third stage of a criminal case, after the complaint and the investigation?

Prosecution

9
New cards

What does the investigator in a criminal or public-sector case submit, at the request
of the prosecuting attorney, if he or she has enough information to support a search
warrant?

An affidavit

10
New cards

When an investigator seeks a search warrant, which of the following must be
included in an affidavit to support the allegation of a crime?

Exhibits

11
New cards

What must be done, under oath, to verify that the information in the affidavit is true?

It must be notarized.

12
New cards

What do published company policies provide for a business that enables them to
conduct internal investigations?

Line of authority

13
New cards

What usually appears when a computer starts or connects to the company intranet,
network, or virtual private network (VPN) and informs end users that the organization
reserves the right to inspect computer systems and network traffic at will?

A warning banner

14
New cards

What term refers to a person using a computer to perform routine tasks other than
systems administration?

End user

15
New cards

Which term refers to an accusation or supposition of fact that a crime has been
committed and is made by the complainant, based on the incident?

Allegation

16
New cards

Without a warning banner, what right might employees assume they have when
using a company's computer systems and network accesses?

Privacy

17
New cards

What term refers to the individual who has the power to conduct digital forensic
investigations?

Authorized requester

18
New cards

What is most often the focus of digital investigations in the private sector?

Misuse of digital assets

19
New cards

Which doctrine, found to be unconstitutional, was used to allow a civilian or private-
sector investigative agent to deliver evidence obtained in a manner that violated the
Fourth Amendment to a law enforcement agency?

Silver-platter

20
New cards

What investigator characteristic, which includes ethics, morals, and standards of
behavior, determines the investigator's credibility?

Professional conduct