Computer Security-23 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| Evidence collected in violation of the fourth amendment of the United States Constitution, the electronic communications privacy act(ECPA) may not be admissible to court under the terms of the__________ | Exclusionary rule |
| Evidence that is legally qualified and reliable is ____________________. | Competent Evidence. |
| Documents, verbal statements, and material objects admissible in a court of law are called__________ | Evidence |
| The rule whereby courts prefer original evidence rather than a copy to ensure that no alteration of the evidence (whether intentional or unintentional) has occurred is termed the ____________________. | Best Evidence Rule. |
| Evidence that is convincing or measures up without question is______________ | Sufficient evidence |
| ____________________ is the preservation, identification, documentation, and interpretation of computer data to be used in legal proceedings. | Forensics. |
| ___________ is evidence that is material to the case or has a bearing on the matter at hand. | Relevant evidence |
| ____________________ is the unused space on a disk drive when a file is smaller than the allocated unit of storage. | Slack Space. |
| ___________ is oral testimony or other evidence that proves a specific fact (such as an eyewitness statement, fingerprint, photo, and so on) the knowledge of the facts is obtained through the five senses as a witness. | Direct evidence |
| ___________________ is the remaining sectors of a previously allocated file that are available for the operating system to use. | Free Space. |
| What defines evidence as being competent___________ | The evidence is legally qualified and reliable |
| Which of the following correctly defines evidence as being relevant? | The evidence is material to the case or has a bearing on the matter at hand. |
| What is documentary evidence? | Evidence in the form of business records, printouts, manuals, and other items. |
| Which of the following correctly defines real evidence? | Tangible objects that prove or disprove a fact. |
| What is the definition of the hearsay rule? | Evidence NOT gathered from the personal knowledge of the witness |
| Which of the following is the LEAST rigorous investigative method? | Examining the suspect system using its software without verification. |
| What is slack space? | The and used space on a disk drive when a file is smaller than the allocated unit of storage(as in a sector). |
| Which of the following correctly describes the minimum contents of an evidence control log book? | Description, Investigator, Case # Date, Time, Location, Reason. |
| What is a message digest? | An algorithm that applies method of operations to a data stream to calculate a unique number based on the information contained in the data stream |
| Which of the following correctly describes the chain of custody for evidence? | Accounts for all persons who handled or had access to a specific item of evidence. |
| What defines evidence as being sufficient? | The evidence is convincing or measures up to without question |
| Which of the following correctly defines the exclusionary rule? | Any evidence collected in violation of the Fourth Amendment is not admissible as evidence. |
| What is the definition of free space? | The remaining sectors of a previously allocated file that are available for the operating system to use |
| If you are investigating a computer incident, and you need to remove the diskdrive from a computer and replace it with a copy so the user doesn't know it has been exchanged, how many copies of the disk should you make, and how should they be used? | Four copies: one is to replace the removed drive; one is marked, sealed, logged, and stored with the original, unmodified disk as evidence; one is for file authentication; and one is for analysis. |
| What is the process of acquiring evidence? | Dump the memory, power down the system, create an intimate of the system, and analyze the image. |
Created by:
ryanparnelltcc1