Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Stack #1777398

QuestionAnswer
Use ____ to secure and catalog the evidence contained in large computer components. evidence bags
When you write your final report, state what you did and what you ____. found
Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed. allegation
You can use ____ to boot to Windows without writing any data to the evidence disk. a write-blocker
A(n) ____ is a person using a computer to perform routine tasks other than systems administration. end user
Forensics tools such as ____ can retrieve deleted files for use as evidence. ProDiscover Basic
A(n) ____ helps you document what has and has not been done with both the original evidence and forensic copies of the evidence. evidence custody form
After a judge approves and signs a search warrant, it’s ready to be executed, meaning you can collect evidence as defined by the warrant. True
By the early 1990s, the ____ introduced training on software for forensics investigations. IACIS
In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation. criminal
When you write your final report, state what you did and what you ____. found
Many attorneys like to have printouts of the data you have recovered, but printouts can present problems when you have log files with several thousand pages of data. True
In any computing investigation, you should be able to repeat the steps you took and produce the same results. This capability is referred to as ____. repeatable findings
In the Pacific Northwest, ____ meets monthly to discuss problems that law enforcement and corporations face. CTIN
____ investigations typically include spam, inappropriate and offensive message content, and harassment or threats. E-mail
____ involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring. Disaster recovery
When analyzing digital evidence, your job is to ____. recover the data
Employees surfing the Internet can cost companies millions of dollars. True
The law of search and seizure protects the rights of all people, excluding people suspected of crimes. False
In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____. affidavit
The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime. computer investigations
To create an exact image of an evidence disk, copying the ____ to a target work disk that’s identical to the evidence disk is preferable. bit-stream image
Chain of custody is also known as chain of evidence. True
It’s the investigator’s responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant. exhibits
Created by: Lady Black Lycan
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards