click below
click below
Normal Size Small Size show me how
Stack #1777398
| Question | Answer |
|---|---|
| Use ____ to secure and catalog the evidence contained in large computer components. | evidence bags |
| When you write your final report, state what you did and what you ____. | found |
| Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed. | allegation |
| You can use ____ to boot to Windows without writing any data to the evidence disk. | a write-blocker |
| A(n) ____ is a person using a computer to perform routine tasks other than systems administration. | end user |
| Forensics tools such as ____ can retrieve deleted files for use as evidence. | ProDiscover Basic |
| A(n) ____ helps you document what has and has not been done with both the original evidence and forensic copies of the evidence. | evidence custody form |
| After a judge approves and signs a search warrant, it’s ready to be executed, meaning you can collect evidence as defined by the warrant. | True |
| By the early 1990s, the ____ introduced training on software for forensics investigations. | IACIS |
| In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation. | criminal |
| When you write your final report, state what you did and what you ____. | found |
| Many attorneys like to have printouts of the data you have recovered, but printouts can present problems when you have log files with several thousand pages of data. | True |
| In any computing investigation, you should be able to repeat the steps you took and produce the same results. This capability is referred to as ____. | repeatable findings |
| In the Pacific Northwest, ____ meets monthly to discuss problems that law enforcement and corporations face. | CTIN |
| ____ investigations typically include spam, inappropriate and offensive message content, and harassment or threats. | |
| ____ involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring. | Disaster recovery |
| When analyzing digital evidence, your job is to ____. | recover the data |
| Employees surfing the Internet can cost companies millions of dollars. | True |
| The law of search and seizure protects the rights of all people, excluding people suspected of crimes. | False |
| In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____. | affidavit |
| The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime. | computer investigations |
| To create an exact image of an evidence disk, copying the ____ to a target work disk that’s identical to the evidence disk is preferable. | bit-stream image |
| Chain of custody is also known as chain of evidence. | True |
| It’s the investigator’s responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant. | exhibits |