Creado por Tyler Rock
hace más de 5 años
|
||
Pregunta | Respuesta |
After a judge approves and signs a search warrant, the _______ is responsible for the collection of evidence as defined by the warrant. A. Digital Evidence Recorder B. Digital Evidence Specialist C. Digital Evidence First Responder D. Digital Evidence Scene Investigator | C. Digital Evidence First Responder |
After the evidence has been presented in a trial by jury, the jury must deliver a(n) _______. A. exhibit B. affidavit C. allegation D. verdict | D. verdict |
An evidence custody form does not usually contain _______. A. the nature of the case B. a description of evidence C. vendor names for computer components D. a witness list | D. a witness list |
The _______ is not one of the three stages of a typical criminal case. A. complaint B. investigation C. civil suit D. prosecution | C. civil suit |
Within a computing investigation, the ability to perform a series of steps again and again to produce the same results is known as _______. A. repeatable findings B. reloadable steps C. verifiable reporting D. evidence reporting | A. repeatable findings |
A chain-of-evidence form, which is used to document what has and has not been done with the original evidence and forensic copies of the evidence, is also known as a(n) _______. A. single-evidence form B. multi-evidence form C. evidence custody form D. evidence tracking form | C. evidence custody form |
If a police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit a(n) _______. A. exhibit B. verdict C. affidavit D. memo | C. affidavit |
In what year was the Computer Fraud and Abuse Act passed? A. 1976 B. 1980 C. 1986 D. 1996 | C. 1986 |
Signed into law in 1973, the _______ was/were created to ensure consistency in federal proceedings. A. Federal Proceedings Law B. Federal Rules of Evidence C. Federal Consistency Standards D. Federal Proceedings Rules | B. Federal Rules of Evidence |
The _______ is responsible for analyzing data and determining when another specialist should be called in to assist with analysis. A. Digital Evidence First Responder B. Digital Evidence Specialist C. Digital Evidence Analyst D. Digital Evidence Examiner | B. Digital Evidence Specialist |
The sale of sensitive or confidential company information to a competitor is known as _______. A. industrial sabotage B. industrial espionage C. industrial collusion D. industrial betrayal | b. industrial espionage |
The term _______ describes a database containing informational records about crimes that have been committed previously by a criminal. A. police ledger B. police blotter C. police blogger D. police recorder | B. police blotter |
What tool, currently maintained by the IRS Criminal Investigation Division and limited to use by law enforcement, can analyze and read special files that are copies of a disk? A. AccessData Forensic Toolkit B. DeepScan C. ILook D. Photorec | C. ILook |
Which Microsoft OS below is the least intrusive to disks in terms of changing data? A. Windows 95 B. Windows XP C. Windows 7 D. MS-DOS 6.22 | D. MS-DOS 6.22 |
Which amendment to the U.S. Constitution protects everyone's right to be secure in their person, residence, and property from search and seizure? A. First Amendment B. Second Amendment C. Fourth Amendment D. Fifth Amendment | C. Fourth Amendment |
Which option below is not a standard systems analysis step? A. Determine a preliminary design or approach to the case. B. Obtain and copy an evidence drive. C. Share evidence with experts outside of the investigation. D. Mitigate or minimize the risks. | C. Share evidence with experts outside of the investigation. |
_______ describes an accusation of fact that a crime has been committed. A. Attrition B. Attribution C. Allegation D. Assignment | C. Allegation |
_______ is not one of the functions of the investigations triad. A. Digital investigations B. Data recovery C. Vulnerability/threat assessment and risk management D. Network intrusion detection and incident response | B. Data recovery |
_______ is not recommended for a digital forensics workstation. A. A text editor tool B. A write-blocker device C. An SCSI card D. Remote access software | D. Remote access software |
_______ must be included in an affidavit to support an allegation in order to justify a warrant. A. Verdicts B. Witnesses C. Exhibits D. Subpoenas | C. Exhibits |
¿Quieres crear tus propias Fichas gratiscon GoConqr? Más información.