SCIA 470 Chapter 1

Description

Chapters 1-5
Tyler Rock
Flashcards by Tyler Rock, updated more than 1 year ago
Tyler Rock
Created by Tyler Rock over 5 years ago
58
0

Resource summary

Question Answer
After a judge approves and signs a search warrant, the _______ is responsible for the collection of evidence as defined by the warrant. A. Digital Evidence Recorder B. ​Digital Evidence Specialist C. Digital Evidence First Responder D. Digital Evidence Scene Investigator C. Digital Evidence First Responder
​After the evidence has been presented in a trial by jury, the jury must deliver a(n) _______. A. exhibit B. ​affidavit C. ​allegation D. verdict D. verdict
​An evidence custody form does not usually contain _______. A. ​the nature of the case B. a description of evidence C. vendor names for computer components D. a witness list D. a witness list
​The _______ is not one of the three stages of a typical criminal case. A. complaint B. investigation C. civil suit D. prosecution C. civil suit
​Within a computing investigation, the ability to perform a series of steps again and again to produce the same results is known as _______. A. repeatable findings B. reloadable steps C. verifiable reporting D. evidence reporting A. repeatable findings
A chain-of-evidence form, which is used to document what has and has not been done with the original evidence and forensic copies of the evidence, is also known as a(n) _______. A. ​single-evidence form B. multi-evidence form C. evidence custody form D. evidence tracking form C. evidence custody form
If a police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit a(n) _______.​ A. exhibit B. verdict C. affidavit D. memo C. affidavit
In what year was the Computer Fraud and Abuse Act passed?​ A. 1976 B. ​1980 C. 1986 D. 1996 C. 1986
Signed into law in 1973, the _______ was/were created to ensure consistency in federal proceedings. A. Federal Proceedings Law B. Federal Rules of Evidence C. Federal Consistency Standards D. ​Federal Proceedings Rules B. Federal Rules of Evidence
The _______ is responsible for analyzing data and determining when another specialist should be called in to assist with analysis. A. Digital Evidence First Responder B. Digital Evidence Specialist C. ​Digital Evidence Analyst D. Digital Evidence Examiner B. Digital Evidence Specialist
The sale of sensitive or confidential company information to a competitor is known as _______. A. ​industrial sabotage B. industrial espionage C. ​industrial collusion D. industrial betrayal b. industrial espionage
The term _______ describes a database containing informational records about crimes that have been committed previously by a criminal. A. police ledger B. police blotter C. ​police blogger D. police recorder B. police blotter
What tool, currently maintained by the IRS Criminal Investigation Division and limited to use by law enforcement, can analyze and read special files that are copies of a disk? A. ​AccessData Forensic Toolkit B. DeepScan C. ​ILook D. Photorec C. ​ILook
Which Microsoft OS below is the least intrusive to disks in terms of changing data?​ A. ​Windows 95 B. Windows XP C. Windows 7 D. MS-DOS 6.22 D. MS-DOS 6.22
Which amendment to the U.S. Constitution protects everyone's right to be secure in their person, residence, and property from search and seizure?​ A. First Amendment B. Second Amendment C. Fourth Amendment D. ​Fifth Amendment C. Fourth Amendment
Which option below is not a standard systems analysis step?​ A. Determine a preliminary design or approach to the case. B. Obtain and copy an evidence drive. C. ​Share evidence with experts outside of the investigation. D. Mitigate or minimize the risks. C. ​Share evidence with experts outside of the investigation.
_______ describes an accusation of fact that a crime has been committed. A. Attrition B. Attribution C. Allegation D. Assignment C. Allegation
_______ is not one of the functions of the investigations triad. A. Digital investigations B. Data recovery C. Vulnerability/threat assessment and risk management D. Network intrusion detection and incident response B. Data recovery
_______ is not recommended for a digital forensics workstation. A. A text editor tool B. ​A write-blocker device C. An SCSI card D. ​Remote access software D. ​Remote access software
_______ must be included in an affidavit to support an allegation in order to justify a warrant. A. Verdicts B. Witnesses C. Exhibits D. Subpoenas C. Exhibits
Show full summary Hide full summary

Similar

Disaster- Test 1 Disaster Medicine- PMU- 3rd Year
Med Student
SCIA 360 Chapter 3
Tyler Rock
SCIA 360 Chapter 4
Tyler Rock
SCIA 360 Chapter 1
Tyler Rock
SCIA 360 Chapter 2
Tyler Rock
SCIA 360 Chapter 5
Tyler Rock
Health Assessment Exam 1
Harry Westbrooks
Testing Site
CDismang
SCIA 370 Chapter 1
Tyler Rock
I Phone
ucmasaecs
Native Plants for Wildlife MSU Quiz 1
Wes Smalley