After a judge approves and signs a search warrant, the _______ is responsible for the collection of evidence as defined by the warrant.
A. Digital Evidence Recorder
B. Digital Evidence Specialist
C. Digital Evidence First Responder
D. Digital Evidence Scene Investigator
After the evidence has been presented in a trial by jury, the jury must deliver a(n) _______.
A. exhibit
B. affidavit
C. allegation
D. verdict
An evidence custody form does not usually contain _______.
A. the nature of the case
B. a description of evidence
C. vendor names for computer components
D. a witness list
The _______ is not one of the three stages of a typical criminal case.
A. complaint
B. investigation
C. civil suit
D. prosecution
Within a computing investigation, the ability to perform a series of steps again and again to produce the same results is known as _______.
A. repeatable findings
B. reloadable steps
C. verifiable reporting
D. evidence reporting
A chain-of-evidence form, which is used to document what has and has not been done with the original evidence and forensic copies of the evidence, is also known as a(n) _______.
A. single-evidence form
B. multi-evidence form
C. evidence custody form
D. evidence tracking form
If a police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit a(n) _______.
A. exhibit
B. verdict
C. affidavit
D. memo
In what year was the Computer Fraud and Abuse Act passed?
A. 1976
B. 1980
C. 1986
D. 1996
Signed into law in 1973, the _______ was/were created to ensure consistency in federal proceedings.
A. Federal Proceedings Law
B. Federal Rules of Evidence
C. Federal Consistency Standards
D. Federal Proceedings Rules
The _______ is responsible for analyzing data and determining when another specialist should be called in to assist with analysis.
A. Digital Evidence First Responder
B. Digital Evidence Specialist
C. Digital Evidence Analyst
D. Digital Evidence Examiner
The sale of sensitive or confidential company information to a competitor is known as _______.
A. industrial sabotage
B. industrial espionage
C. industrial collusion
D. industrial betrayal
The term _______ describes a database containing informational records about crimes that have been committed previously by a criminal.
A. police ledger
B. police blotter
C. police blogger
D. police recorder
What tool, currently maintained by the IRS Criminal Investigation Division and limited to use by law enforcement, can analyze and read special files that are copies of a disk?
A. AccessData Forensic Toolkit
B. DeepScan
C. ILook
D. Photorec
Which Microsoft OS below is the least intrusive to disks in terms of changing data?
A. Windows 95
B. Windows XP
C. Windows 7
D. MS-DOS 6.22
Which amendment to the U.S. Constitution protects everyone's right to be secure in their person, residence, and property from search and seizure?
A. First Amendment
B. Second Amendment
C. Fourth Amendment
D. Fifth Amendment
Which option below is not a standard systems analysis step?
A. Determine a preliminary design or approach to the case.
B. Obtain and copy an evidence drive.
C. Share evidence with experts outside of the investigation.
D. Mitigate or minimize the risks.
_______ describes an accusation of fact that a crime has been committed.
A. Attrition
B. Attribution
C. Allegation
D. Assignment
_______ is not one of the functions of the investigations triad.
A. Digital investigations
B. Data recovery
C. Vulnerability/threat assessment and risk management
D. Network intrusion detection and incident response
_______ is not recommended for a digital forensics workstation.
A. A text editor tool
B. A write-blocker device
C. An SCSI card
D. Remote access software
_______ must be included in an affidavit to support an allegation in order to justify a warrant.
A. Verdicts
B. Witnesses
C. Exhibits
D. Subpoenas