click below
click below
Normal Size Small Size show me how
Forensics - M Choice
| Question | Answer |
|---|---|
| __________________ records are data the system maintains, such as system log files and proxy server logs. | Computer-generated |
| Investigating and controlling computer incident scenes in the corporate environment is ____ ______ ____ in the criminal environment. | much easier than |
| Every business or organization must have a well defined process that describes when an investigation can be initiated. At a minimum, most corporate policies require that employers have a __________ _________ that a law or policy is being violated. | reasonable suspicion |
| When recovering evidence from a contaminated crime scene, if the temperature in the contaminated room is higher than __ degrees, you should take measures to prevent a hard disk from overheating to prevent damage. | 80 |
| With an ________________ _____ ___, you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible. | initial-response field kit |
| Courts consider evidence data in a computer as ________ evidence. | physical |
| When seizing computer evidence in criminal investigations, follow the ____ ___ standards for seizing digital data. | U.S. DoJ |
| Certain files, such as the _____ ___ and Security log in Windows XP, might lose essential network activity records if the power is terminated without a proper shutdown. | Event log |
| One technique for extracting evidence from large systems is called ______ ___________. | sparse acquisition |
| The most common computer-related crime is _____ _____. | check fraud |
| A ________ is a column of tracks on two or more disk platters. | cylinder |
| _____ _______ refers to the number of bits in one square inch of a disk platter. | Areal Density |