PDF Download
FREE AND STUDY GAMES ABOUT STACK #1777398 EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -23 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: A(n) ____ helps you document what has and has not been done with both the original evidence and forensic copies of the evidence.
Answer:
evidence custody form Question 2: After a judge approves and signs a search warrant, it's ready to be executed, meaning you can collect evidence as defined by the warrant.
Answer:
True Question 3: In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.
Answer:
affidavit Question 4: Employees surfing the Internet can cost companies millions of dollars.
Answer:
True
Question 5: In the Pacific Northwest, ____ meets monthly to discuss problems that law enforcement and corporations face.
Answer:
CTIN Question 6: Many attorneys like to have printouts of the data you have recovered, but printouts can present problems when you have log files with several thousand pages of data.
Answer:
True Question 7: ____ investigations typically include spam, inappropriate and offensive message content, and harassment or threats.
Answer:
E-mail Question 8: In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.
Answer:
criminal Question 9: Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed.
Answer:
allegation
Question 10: When analyzing digital evidence, your job is to ____.
Answer:
recover the data Question 11: In any computing investigation, you should be able to repeat the steps you took and produce the same results. This capability is referred to as ____.
Answer:
repeatable findings
Question 12: Chain of custody is also known as chain of evidence.
Answer:
True Question 13: The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.
Answer:
computer investigations Question 14: It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.
Answer:
exhibits Question 15: By the early 1990s, the ____ introduced training on software for forensics investigations.
Answer:
IACIS Question 16: When you write your final report, state what you did and what you ____.
Answer:
found Question 17: Forensics tools such as ____ can retrieve deleted files for use as evidence.
Answer:
ProDiscover Basic Question 18: Use ____ to secure and catalog the evidence contained in large computer components.
Answer:
evidence bags Question 19: A(n) ____ is a person using a computer to perform routine tasks other than systems administration.
Answer:
end user
Question 20: To create an exact image of an evidence disk, copying the ____ to a target work disk that's identical to the evidence disk is preferable.
Answer:
bit-stream image Question 21: ____ involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring.
Answer:
Disaster recovery Question 22: You can use ____ to boot to Windows without writing any data to the evidence disk.
Answer:
a write-blocker Question 23: The law of search and seizure protects the rights of all people, excluding people suspected of crimes.
Answer:
False