1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which entity was formed by the FBI in 1984 to handle the increasing number of
cases involving digital evidence?
Computer Analysis and Response Team
A technician is trying to recover information on a computer that has been hidden or
deleted on purpose in order to hide evidence of a crime. Which type of task is the
technician performing?
Data recovery
Which group often works as part of a team to secure an organization's computers
and networks?
Forensics investigators
Which group manages investigations and conducts forensic analysis of systems
suspected of containing evidence related to an incident or a crime?
Digital investigations
Which agency introduced training on software for forensics investigations by the
early 1990s?
IACIS
Which Pacific Northwest agency meets to discuss problems that digital forensics
examiners encounter?
CTIN
Which type of case involves charges such as burglary, murder, or molestation?
Criminal
What is the third stage of a criminal case, after the complaint and the investigation?
Prosecution
What does the investigator in a criminal or public-sector case submit, at the request
of the prosecuting attorney, if he or she has enough information to support a search
warrant?
An affidavit
When an investigator seeks a search warrant, which of the following must be
included in an affidavit to support the allegation of a crime?
Exhibits
What must be done, under oath, to verify that the information in the affidavit is true?
It must be notarized.
What do published company policies provide for a business that enables them to
conduct internal investigations?
Line of authority
What usually appears when a computer starts or connects to the company intranet,
network, or virtual private network (VPN) and informs end users that the organization
reserves the right to inspect computer systems and network traffic at will?
A warning banner
What term refers to a person using a computer to perform routine tasks other than
systems administration?
End user
Which term refers to an accusation or supposition of fact that a crime has been
committed and is made by the complainant, based on the incident?
Allegation
Without a warning banner, what right might employees assume they have when
using a company's computer systems and network accesses?
Privacy
What term refers to the individual who has the power to conduct digital forensic
investigations?
Authorized requester
What is most often the focus of digital investigations in the private sector?
Misuse of digital assets
Which doctrine, found to be unconstitutional, was used to allow a civilian or private-
sector investigative agent to deliver evidence obtained in a manner that violated the
Fourth Amendment to a law enforcement agency?
Silver-platter
What investigator characteristic, which includes ethics, morals, and standards of
behavior, determines the investigator's credibility?
Professional conduct