Description
Guide to Computer Forensics and Investigations 5th Edition Bill Nelson Amelia Phillips Christopher Steuart- Test Bank
Sample Questions
Instant Download With Answers
Chapter_02__The_Investigator_s_Office_and_Laboratory
True / False |
1. Linux Live CDs and WinFE disks do not automatically mount hard drives, but can be used to view file systems.
ANSWER: |
True |
POINTS: |
1 |
REFERENCES: |
68 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:21 PM |
DATE MODIFIED: |
10/2/2014 11:30 PM |
|
2. The shielding of sensitive computing systems and prevention of electronic eavesdropping of any computer emissions is known as FAUST by the U.S. Department of Defense.
ANSWER: |
False |
POINTS: |
1 |
REFERENCES: |
72 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:39 PM |
DATE MODIFIED: |
10/2/2014 11:30 PM |
|
3. The recording of all updates made to a workstation or machine is referred to as configuration management.
ANSWER: |
True |
POINTS: |
1 |
REFERENCES: |
79 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:43 PM |
DATE MODIFIED: |
10/2/2014 11:33 PM |
|
4. A disaster recovery plan ensures that workstations and file servers can be restored to their original condition in the event of a catastrophe.
ANSWER: |
True |
POINTS: |
1 |
REFERENCES: |
79 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 10:20 PM |
DATE MODIFIED: |
10/2/2014 11:33 PM |
|
5. Because they are outdated, ribbon cables should not be considered for use within a forensics lab.
ANSWER: |
False |
POINTS: |
1 |
REFERENCES: |
78 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 10:23 PM |
DATE MODIFIED: |
10/2/2014 11:33 PM |
|
6. Candidates who complete the IACIS test successfully are designated as a _______.
|
a. |
Certified Forensic Computer Examiner (CFCE) |
|
b. |
Certified Forensics Investigator (CFI) |
|
c. |
Certified Investigative Forensics Examiner (CIFE) |
|
d. |
Certified Investigative Examiner (CIE) |
ANSWER: |
a |
POINTS: |
1 |
REFERENCES: |
68 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:30 PM |
DATE MODIFIED: |
10/2/2014 11:34 PM |
|
7. What certification program, sponsored by ISC2, requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations?
|
a. |
Certified Computer Crime Investigator |
|
b. |
Certified Forensic Computer Examiner |
|
c. |
Certified Cyber Forensics Professional |
|
d. |
EnCase Certified Examiner |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
69 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:34 PM |
DATE MODIFIED: |
10/2/2014 11:36 PM |
|
8. How long are computing components designed to last in a normal business environment?
|
a. |
12 to 16 months |
|
b. |
14 to 26 months |
|
c. |
18 to 36 months |
|
d. |
36 to 90 months |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
79 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:53 PM |
DATE MODIFIED: |
10/2/2014 11:36 PM |
|
9. Which of the following scenarios should be covered in a disaster recovery plan?
|
a. |
damage caused by lightning strikes |
|
b. |
damage caused by flood |
|
c. |
damage caused by a virus contamination |
|
d. |
all of the above |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
79 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 12:13 AM |
DATE MODIFIED: |
10/2/2014 11:41 PM |
|
10. Which operating system listed below is not a distribution of the Linux OS?
|
a. |
Minix |
|
b. |
Debian |
|
c. |
Slackware |
|
d. |
Fedora |
ANSWER: |
a |
POINTS: |
1 |
REFERENCES: |
78 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 10:30 PM |
DATE MODIFIED: |
10/2/2014 11:41 PM |
|
11. _______ describes the characteristics of a safe storage container.
|
a. |
ISO2960 |
|
b. |
NISPOM |
|
c. |
SSO 990 |
|
d. |
STORSEC |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
72 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 10:35 PM |
DATE MODIFIED: |
10/2/2014 11:42 PM |
|
12. In order to qualify for the Certified Computer Forensic Technician, Basic Level certification, how many hours of computer forensics training are required?
|
a. |
10 |
|
b. |
20 |
|
c. |
30 |
|
d. |
40 |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
69 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 10:37 PM |
DATE MODIFIED: |
10/2/2014 11:42 PM |
|
13. Which file system below is utilized by the Xbox gaming system?
|
a. |
NTFS |
|
b. |
ReFS |
|
c. |
EXT |
|
d. |
FATX |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
67 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 10:39 PM |
DATE MODIFIED: |
10/2/2014 11:43 PM |
|
14. Which ISO standard below is followed by the ASCLD?
|
a. |
17025:2005 |
|
b. |
17026:2007 |
|
c. |
12075:2007 |
|
d. |
12076:2005 |
ANSWER: |
a |
POINTS: |
1 |
REFERENCES: |
64 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 10:40 PM |
DATE MODIFIED: |
10/2/2014 11:43 PM |
|
15. _______ is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence.
|
a. |
The lab manager |
|
b. |
The lab investigator |
|
c. |
The lab secretary |
|
d. |
The lab steward |
ANSWER: |
a |
POINTS: |
1 |
REFERENCES: |
65 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 1:08 PM |
DATE MODIFIED: |
10/2/2014 11:44 PM |
|
16. What percentage of consumers utilize Intel and AMD PCs?
|
a. |
60 |
|
b. |
70 |
|
c. |
80 |
|
d. |
90 |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
65 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 1:24 PM |
DATE MODIFIED: |
10/2/2014 11:44 PM |
|
17. _______ can be used to restore backup files directly to a workstation.
|
a. |
Belarc Advisor |
|
b. |
Norton Ghost |
|
c. |
ProDiscover |
|
d. |
Photorec |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
79 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 1:36 PM |
DATE MODIFIED: |
10/2/2014 11:44 PM |
|
18. How often should hardware be replaced within a forensics lab?
|
a. |
Every 6 to 12 months |
|
b. |
Every 12 to 18 months |
|
c. |
Every 18 to 24 months |
|
d. |
Every 24 to 30 months |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
79 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 1:41 PM |
DATE MODIFIED: |
10/2/2014 11:45 PM |
|
19. A TEMPEST facility is designed to accomplish which of the following goals?
|
a. |
Prevent data loss by maintaining consistent backups. |
|
b. |
Shield sensitive computing systems and prevent electronic eavesdropping of computer emissions. |
|
c. |
Ensure network security from the Internet using comprehensive security software. |
|
d. |
Protect the integrity of data. |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
72 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:02 PM |
DATE MODIFIED: |
10/2/2014 11:45 PM |
|
20. In order to qualify for the Advanced Certified Computer Forensic Technician certification, a candidate must have _______ years of hands-on experience in computer forensics investigations.
|
a. |
two |
|
b. |
three |
|
c. |
five |
|
d. |
six |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
69 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:15 PM |
DATE MODIFIED: |
10/2/2014 11:46 PM |
|
21. In order to qualify for the Certified Computer Crime Investigator, Basic Level certification, candidates must provide documentation of at least _______ cases in which they participated.
|
a. |
5 |
|
b. |
10 |
|
c. |
15 |
|
d. |
20 |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
69 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:18 PM |
DATE MODIFIED: |
10/2/2014 11:46 PM |
|
22. Which tool below is not recommended for use in a forensics lab?
|
a. |
2.5-inch adapters for drives |
|
b. |
FireWire and USB adapters |
|
c. |
SCSI cards |
|
d. |
Degausser |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
78 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:26 PM |
DATE MODIFIED: |
10/2/2014 11:46 PM |
|
23. Which option below is not a recommendation for securing storage containers?
|
a. |
The container should be located in a restricted area. |
|
b. |
Only authorized access should be allowed, and it should be kept to a minimum. |
|
c. |
Evidence containers should remain locked when they aren’t under direct supervision. |
|
d. |
Rooms with evidence containers should have a secured wireless network. |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
72 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:32 PM |
DATE MODIFIED: |
10/2/2014 11:47 PM |
|
24. Which option below is not one of the recommended practices for maintaining a keyed padlock?
|
a. |
Appoint a key custodian. |
|
b. |
Take inventory of all keys when the custodian changes. |
|
c. |
Use a master key. |
|
d. |
Change locks and keys annually. |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
73 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:40 PM |
DATE MODIFIED: |
10/2/2014 11:47 PM |
|
25. _______ is a specialized viewer software program.
|
a. |
FastView |
|
b. |
IrfanView |
|
c. |
ThumbsLoader |
|
d. |
ABSee |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
78 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:50 PM |
DATE MODIFIED: |
10/2/2014 11:48 PM |
|
26. _______________ are generated at the federal, state, and local levels to show the types and frequency of crimes committed.
ANSWER: |
Uniform Crime Reports |
POINTS: |
1 |
REFERENCES: |
67 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:25 PM |
DATE MODIFIED: |
10/2/2014 11:48 PM |
|
27. A(n) _______________ acts as an evidence locker or safe to preserve the integrity of evidence.
ANSWER: |
secure facility |
POINTS: |
1 |
REFERENCES: |
71 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:38 PM |
DATE MODIFIED: |
10/2/2014 11:48 PM |
|
28. The ________________________ provides guidelines to members for managing a forensics lab and acquiring crime and forensics lab accreditation.
ANSWER: |
American Society of Crime Laboratory Directors (ASCLD) |
POINTS: |
1 |
REFERENCES: |
64 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:47 PM |
DATE MODIFIED: |
10/2/2014 11:49 PM |
|
29. A(n) ______________ is a plan that can be used to sell your services to management or clients, in which a justification is made for acquiring newer and better resources to investigate digital forensics cases.
ANSWER: |
business case |
POINTS: |
1 |
REFERENCES: |
80 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
7/28/2014 11:50 PM |
DATE MODIFIED: |
10/2/2014 11:50 PM |
|
30. As part of a business case, _______________ requires researching different products to determine which one is the best and most cost effective.
ANSWER: |
acquisition planning |
POINTS: |
1 |
REFERENCES: |
83 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 12:04 AM |
DATE MODIFIED: |
10/2/2014 11:51 PM |
|
a. |
Business case |
b. |
Certified Computer Examiner (CCE) |
c. |
Certified Cyber Forensics Professional (CCFP) |
d. |
Certified Forensic Computer Examiner (CFCE) |
e. |
Configuration management |
f. |
Digital forensics lab |
g. |
High Tech Crime Network (HTCN) |
h. |
Risk management |
i. |
Secure facility |
j. |
TEMPEST |
REFERENCES: |
85-86 |
QUESTION TYPE: |
Matching |
HAS VARIABLES: |
False |
DATE CREATED: |
7/30/2014 12:35 AM |
DATE MODIFIED: |
8/13/2014 5:19 PM |
|
31. A certification from the International Society of Forensic Computer Examiners
|
32. A lab dedicated to computing investigations; typically, it has a variety of computers, OSs, and forensics software
|
33. A certification from ISC2 for completing the education and work experience and passing the exam
|
34. A facility that can be locked and allows limited access to the room’s contents
|
35. The process of keeping track of all upgrades and patches you apply to your computer’s OS and applications
|
36. A term referring to facilities that have been hardened so that electrical signals from computers, the computer network, and telephone systems can’t be monitored or accessed easily by someone outside the facility
|
37. A national organization that provides certification for computer crime investigators and digital forensics technicians
|
38. A certificate awarded by IACIS at completion of all portions of the exam
|
39. The process of determining how much risk is acceptable for any process or operation, such as replacing equipment
|
40. A document that provides justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility
|
41. What are three questions that should be asked when performing the justification step?
ANSWER: |
The following questions are all valid questions during the justification step:
• What type of computing investigation service is needed for your organization?
• Who are the potential customers for this service, and how will it be budgeted—as an
internal operation (police department or company security department, for instance) or
an external operation (a for-profit business venture)?
• How will you advertise your services to customers?
• What time-management techniques will you use?
• Where will the initial and sustaining budget for business operations come from? |
POINTS: |
1 |
REFERENCES: |
81 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 12:05 AM |
DATE MODIFIED: |
10/2/2014 11:51 PM |
|
42. List three practices that should be followed when using a keyed padlock.
ANSWER: |
The following practices are all valid when using a keyed padlock:
• Appoint a key custodian who’s responsible for distributing keys.
• Stamp sequential numbers on each duplicate key.
• Maintain a registry listing which key is assigned to which authorized person.
• Conduct a monthly audit to ensure that no authorized person has lost a key.
• Take an inventory of all keys when the custodian changes.
• Place keys in a lockable container accessible only to the lab manager and designated
key custodian.
• Maintain the same level of security for keys as for evidence containers.
• Change locks and keys annually; if a key is missing, replace all associated locks and
the key.
• Do not use a master key for several locks. |
POINTS: |
1 |
REFERENCES: |
73 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 11:46 PM |
DATE MODIFIED: |
10/3/2014 12:18 AM |
|
43. A forensics lab should maintain a paper or electronic sign-in log for all visitors. What information should be in this log?
ANSWER: |
The log should list the visitor’s name, date and time of arrival and departure, employer’s name, purpose of the visit, and name of the lab member receiving the visitor. |
POINTS: |
1 |
REFERENCES: |
74 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
7/29/2014 11:56 PM |
DATE MODIFIED: |
10/3/2014 12:19 AM |
|
44. What can be done to help prevent the buildup of static electricity?
ANSWER: |
Antistatic pads can be placed around electronic workbenches and workstations. Floors and carpets can be cleaned at least once a week to minimize dust buildup. |
POINTS: |
1 |
REFERENCES: |
73 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:23 PM |
DATE MODIFIED: |
10/3/2014 12:20 AM |
|
45. What information should be recorded every time an evidence container is opened and closed?
ANSWER: |
A log listing should be made that indicates the date it was opened and the initials of the authorized person opening the container. The records should be maintained for at least three years or longer. |
POINTS: |
1 |
REFERENCES: |
73 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:45 PM |
DATE MODIFIED: |
10/3/2014 12:21 AM |
|
46. How should backups be stored and maintained?
ANSWER: |
Backups should be stored where they are easily accessible. At least one copy of backups should exist on site, and a duplicate copy or previous copy should be stored off site in a secure facility. Off-site backups should be rotated on a schedule. |
POINTS: |
1 |
REFERENCES: |
79 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:56 PM |
DATE MODIFIED: |
10/3/2014 12:21 AM |
|
47. What is a business case used for?
ANSWER: |
A business case is used to sell services to management or clients, and justify the acquisition of newer and better resources to investigate digital forensics cases. |
POINTS: |
1 |
REFERENCES: |
80 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 3:01 PM |
DATE MODIFIED: |
10/3/2014 12:22 AM |
|
48. When creating a new forensics lab, what are some questions that should be considered when calculating the budget required? List at least three questions.
ANSWER: |
The following questions should be considered when developing a budget for a new forensics lab:
• How many digital forensics examiners will you need?
• How much training will each examiner require per year, and what are the estimated costs?
• Will you need more than one lab?
• How many digital forensics examiners will use each lab? Will there be a need to accommodate other nonexaminers temporarily to inspect recovered evidence?
• What are the costs to construct a secure lab?
• Is there a suitable room that can be converted into a lab?
• Does the designated room have enough electrical power and heating, ventilation, and air-conditioning (HVAC) systems?
• Does the designated room have existing phone lines and network cables? If not, how much will it cost to install these items?
• Is there an adequate lock on the designated room’s door?
• What will the furniture costs be?
• Will you need to install an alarm system?
• Are there any other facility costs, such as fees for janitorial services and facility maintenance services?
• If IT support is needed, how many hours of support are estimated? |
POINTS: |
1 |
REFERENCES: |
82 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 3:03 PM |
DATE MODIFIED: |
10/3/2014 12:22 AM |
|
49. What should be included as part of the approval process?
ANSWER: |
A risk analysis plan should be included describing how the lab will minimize the risk of litigation. An estimation of how many investigations are anticipated and how long they will take to complete on average should also be included. |
POINTS: |
1 |
REFERENCES: |
83 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 3:05 PM |
DATE MODIFIED: |
10/3/2014 12:27 AM |
|
50. List at least three things that should be included in an audit of a digital forensics lab.
ANSWER: |
The following items are all valid for consideration in an audit of a digital forensics lab:
• Inspect the lab’s ceiling, floor, roof, and exterior walls at least once a month, looking
for anything unusual or new.
• Inspect doors to make sure they close and lock correctly.
• Check locks to see whether they need to be replaced or changed.
• Review visitor logs to see whether they’re being used properly.
• Review log sheets for evidence containers to determine when they have been opened
and closed.
• At the end of every workday, secure any evidence that’s not being processed on a
forensic workstation. |
POINTS: |
1 |
REFERENCES: |
74 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 3:07 PM |
DATE MODIFIED: |
10/3/2014 12:27 AM |
|
Chapter_04__Processing_Crime_and_Incident_Scenes
True / False |
1. Computer-stored records are data the system maintains, such as system log files and proxy server logs.
ANSWER: |
False |
POINTS: |
1 |
REFERENCES: |
139 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:01 AM |
DATE MODIFIED: |
8/15/2014 1:51 PM |
|
2. An emergency situation under the PATRIOT Act is defined as the immediate risk of death or personal injury, such as finding a bomb threat in an e-mail.
ANSWER: |
True |
POINTS: |
1 |
REFERENCES: |
144 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:05 AM |
DATE MODIFIED: |
8/15/2014 2:00 PM |
|
3. The Fourth Amendment states that only warrants “particularly describing the place to be searched and the persons or things to be seized” can be issued. The courts have determined that this phrase means a warrant can authorize a search of a specific place for anything.
ANSWER: |
False |
POINTS: |
1 |
REFERENCES: |
147 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:08 AM |
DATE MODIFIED: |
8/15/2014 2:01 PM |
|
4. State public disclosure laws apply to state records, but FOIA allows citizens to request copies of public documents created by federal agencies.
ANSWER: |
True |
POINTS: |
1 |
REFERENCES: |
144 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:12 AM |
DATE MODIFIED: |
8/15/2014 2:02 PM |
|
5. To investigate employees suspected of improper use of company digital assets, a company policy statement about misuse of digital assets allows corporate investigators to conduct covert surveillance with little or no cause, and access company computer systems and digital devices without a warrant.
ANSWER: |
True |
POINTS: |
1 |
REFERENCES: |
145 |
QUESTION TYPE: |
True / False |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:15 AM |
DATE MODIFIED: |
8/15/2014 2:03 PM |
|
6. _______ would not be found in an initial-response field kit.
|
a. |
Computer evidence bags (antistatic bags) |
|
b. |
Leather gloves and disposable latex gloves |
|
c. |
A digital camera with extra batteries or 35mm camera with film and flash |
|
d. |
External USB devices or a portable hard drive |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
153 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 12:36 AM |
DATE MODIFIED: |
8/18/2014 9:02 AM |
|
7. _______ is a common cause for lost or corrupted evidence.
|
a. |
Public access |
|
b. |
Not having enough people on the processing team |
|
c. |
Having an undefined security perimeter |
|
d. |
Professional curiosity |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
155 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 1:00 AM |
DATE MODIFIED: |
8/18/2014 9:03 AM |
|
8. What does FRE stand for?
|
a. |
Federal Rules of Evidence |
|
b. |
Federal Regulations for Evidence |
|
c. |
Federal Rights for Everyone |
|
d. |
Federal Rules for Equipment |
ANSWER: |
a |
POINTS: |
1 |
REFERENCES: |
137 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 7:08 PM |
DATE MODIFIED: |
8/15/2014 2:06 PM |
|
9. If practical, _______ team(s) should collect and catalog digital evidence at a crime scene or lab.
|
a. |
two |
|
b. |
five |
|
c. |
one |
|
d. |
three |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
137 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 7:12 PM |
DATE MODIFIED: |
10/4/2014 1:31 PM |
|
10. _______ is the term for a statement that is made by someone other than an actual witness to the event while testifying at a hearing.
|
a. |
Second-party evidence |
|
b. |
Rumor |
|
c. |
Fiction |
|
d. |
Hearsay |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
138 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 7:43 PM |
DATE MODIFIED: |
8/18/2014 9:05 AM |
|
11. You must abide by the _______ while collecting evidence.
|
a. |
Fourth Amendment |
|
b. |
Federal Rules of Evidence |
|
c. |
state’s Rules of Evidence |
|
d. |
Fifth Amendment |
ANSWER: |
a |
POINTS: |
1 |
REFERENCES: |
173 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 7:49 PM |
DATE MODIFIED: |
10/4/2014 4:00 PM |
|
12. Which of the following is not done when preparing for a case?
|
a. |
Describe the nature of the case. |
|
b. |
Identify the type of OS. |
|
c. |
Set up covert surveillance. |
|
d. |
Determine whether you can seize the computer or digital device. |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
173 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 8:11 PM |
DATE MODIFIED: |
10/4/2014 4:01 PM |
|
13. A _______ is not a private sector organization.
|
a. |
small to medium business |
|
b. |
large corporation |
|
c. |
non-government organization |
|
d. |
hospital |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
143 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 8:20 PM |
DATE MODIFIED: |
8/18/2014 9:06 AM |
|
14. In cases that involve dangerous settings, what kind of team should be used to recover evidence from the scene?
|
a. |
B-Team |
|
b. |
HAZMAT |
|
c. |
CDC First Responders |
|
d. |
SWAT |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
150 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 11:30 PM |
DATE MODIFIED: |
10/4/2014 4:02 PM |
|
15. _______ are a special category of private sector businesses, due to their ability to investigate computer abuse committed by employees only, but not customers.
|
a. |
Hospitals |
|
b. |
ISPs |
|
c. |
Law firms |
|
d. |
News networks |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
144 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 9:15 AM |
DATE MODIFIED: |
10/4/2014 4:04 PM |
|
16. The ability to obtain a search warrant from a judge that authorizes a search and seizure of specific evidence requires sufficient _______.
|
a. |
probable cause |
|
b. |
due diligence |
|
c. |
accusations |
|
d. |
reliability |
ANSWER: |
a |
POINTS: |
1 |
REFERENCES: |
147 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 9:25 AM |
DATE MODIFIED: |
10/4/2014 4:07 PM |
|
17. Which court case established that it is not necessary for computer programmers to testify in order to authenticate computer-generated records?
|
a. |
United States v. Wong |
|
b. |
United States v. Carey |
|
c. |
United States v. Salgado |
|
d. |
United States v. Walser |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
139 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 9:38 AM |
DATE MODIFIED: |
10/4/2014 4:09 PM |
|
18. What should you do while copying data on a suspect’s computer that is still live?
|
a. |
Open files to view contents. |
|
b. |
Make notes regarding everything you do. |
|
c. |
Conduct a Google search of unknown extensions using the computer. |
|
d. |
Check Facebook for additional suspects. |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
158 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 3:23 PM |
DATE MODIFIED: |
10/4/2014 4:09 PM |
|
19. The term _______ describes rooms filled with extremely large disk systems that are typically used by large business data centers.
|
a. |
storage room |
|
b. |
server farm |
|
c. |
data well |
|
d. |
storage hub |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
159 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 3:25 PM |
DATE MODIFIED: |
10/4/2014 4:14 PM |
|
20. _______ does not recover data in free or slack space.
|
a. |
Raw format acquisition |
|
b. |
Live acquisition |
|
c. |
Static acquisition |
|
d. |
Sparse acquisition |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
159 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 3:27 PM |
DATE MODIFIED: |
10/4/2014 4:38 PM |
|
21. When seizing digital evidence in criminal investigations, whose standards should be followed?
|
a. |
U.S. DOJ |
|
b. |
ISO/IEC |
|
c. |
IEEE |
|
d. |
ITU |
ANSWER: |
a |
POINTS: |
1 |
REFERENCES: |
155 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 3:41 PM |
DATE MODIFIED: |
10/4/2014 4:38 PM |
|
22. The term _______ is used to describe someone who might be a suspect or someone with additional knowledge that can provide enough evidence of probable cause for a search warrant or arrest.
|
a. |
criminal |
|
b. |
potential data source |
|
c. |
person of interest |
|
d. |
witness |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
175 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 3:47 PM |
DATE MODIFIED: |
10/4/2014 4:42 PM |
|
23. What type of media has a 30-year lifespan?
|
a. |
DVD-Rs |
|
b. |
DLT magnetic tape |
|
c. |
hard drive |
|
d. |
USB thumb drive |
ANSWER: |
b |
POINTS: |
1 |
REFERENCES: |
161 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 3:52 PM |
DATE MODIFIED: |
10/4/2014 4:43 PM |
|
24. As a general rule, what should be done by forensics experts when a suspect computer is seized in a powered-on state?
|
a. |
The power cable should be pulled. |
|
b. |
The system should be shut down gracefully. |
|
c. |
The power should be left on. |
|
d. |
The decision should be left to the Digital Evidence First Responder (DEFR). |
ANSWER: |
d |
POINTS: |
1 |
REFERENCES: |
157 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 4:02 PM |
DATE MODIFIED: |
10/4/2014 4:44 PM |
|
25. Which system below can be used to quickly and accurately match fingerprints in a database?
|
a. |
Fingerprint Identification Database (FID) |
|
b. |
Systemic Fingerprint Database (SFD) |
|
c. |
Automated Fingerprint Identification System (AFIS) |
|
d. |
Dynamic Fingerprint Matching System (DFMS) |
ANSWER: |
c |
POINTS: |
1 |
REFERENCES: |
155 |
QUESTION TYPE: |
Multiple Choice |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 4:05 PM |
DATE MODIFIED: |
10/4/2014 4:44 PM |
|
Match the terms with the correct definitions.
a. |
Computer-generated records |
b. |
Keyed hash set |
c. |
Cyclic Redundancy Check |
d. |
Message Digest 5 |
e. |
Computer-stored records |
f. |
Probable cause |
g. |
Extensive-response field kit |
h. |
Sniffing |
i. |
Nonkeyed hash set |
j. |
Initial-response field kit |
REFERENCES: |
174-175 |
QUESTION TYPE: |
Matching |
HAS VARIABLES: |
False |
DATE CREATED: |
8/2/2014 2:20 AM |
DATE MODIFIED: |
8/15/2014 2:39 PM |
|
26. Data the system maintains, such as system log files and proxy server logs
|
27. Electronic data that a person creates and saves on a computer or digital device, such as a spreadsheet or word-processing document
|
28. A mathematic algorithm that translates a file into a unique hexadecimal value
|
29. A value created by an encryption utility’s secret key
|
30. A unique hash number generated by a software tool and used to identify files
|
31. An algorithm that produces a hexadecimal value of a file or storage media; used to determine whether data has changed
|
32. Detecting data transmissions to and from a suspect’s computer and a network server to determine the type of data being transmitted over a network
|
33. A portable kit containing only the minimum tools needed to perform disk acquisitions and preliminary forensics analysis in the field
|
34. A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers
|
35. The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest
|
36.
________________ can be any information stored or transmitted in digital form.
ANSWER: |
Digital evidence |
POINTS: |
1 |
REFERENCES: |
136 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 8:35 PM |
DATE MODIFIED: |
8/15/2014 2:44 PM |
|
37. In the United States, ____________ and similar agencies must comply with state public disclosure and federal Freedom of Information Act (FOIA) laws, and make certain documents available as public records.
ANSWER: |
non-government organizations (NGOs) |
POINTS: |
1 |
REFERENCES: |
143 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 8:37 PM |
DATE MODIFIED: |
8/15/2014 2:45 PM |
|
38. The ______________ rule states that to prove the content of a written document, recording, or photograph, ordinarily the original writing, recording, or photograph is required.
ANSWER: |
best evidence |
POINTS: |
1 |
REFERENCES: |
142 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 8:39 PM |
DATE MODIFIED: |
8/15/2014 2:47 PM |
|
39. The ____________________ doesn’t extend to supporting a general exploratory search from one object to another unless something incriminating is found.
ANSWER: |
plain view doctrine |
POINTS: |
1 |
REFERENCES: |
149 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 8:47 PM |
DATE MODIFIED: |
8/15/2014 2:48 PM |
|
40. Instead of producing hard disks in court, attorneys can submit ______ copies of files as evidence.
ANSWER: |
printed |
POINTS: |
1 |
REFERENCES: |
143 |
QUESTION TYPE: |
Completion |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 9:07 PM |
DATE MODIFIED: |
10/4/2014 4:45 PM |
|
41. Like most common law nations, the United States excludes hearsay as spelled out in the FRE Article VIII, Rule 802. Rules 803 and 804 cite more than 20 exceptions for when hearsay can be used. Provide five examples that apply to digital forensics investigations.
ANSWER: |
Five examples of hearsay that can be used are:
- Business records, including those of a public agency
- Certain public records and reports
- Evidence of the absence of a business record or entry
- Learned treatises used to question an expert witness
- Statement of the absence of a public record or entry
|
POINTS: |
1 |
REFERENCES: |
138 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 9:23 PM |
DATE MODIFIED: |
8/15/2014 2:52 PM |
|
42. The plain view doctrine states that objects falling in the direct sight of an officer who has the right to be in a location are subject to seizure without a warrant and can be introduced into evidence. Provide the three criteria that must be met in order for the plain view doctrine to apply.
ANSWER: |
In order for the plain view doctrine to apply, the following three criteria must be met:
- The officer is where he or she has a legal right to be.
- Ordinary senses must not be enhanced by advanced technology in any way, such as with binoculars.
- Any discovery must be by chance.
|
POINTS: |
1 |
REFERENCES: |
148 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 10:03 PM |
DATE MODIFIED: |
8/15/2014 2:54 PM |
|
43. Compare and contrast hashing methods using a keyed hash set and a nonkeyed hash set.
ANSWER: |
A nonkeyed hash set is a unique hash number generated by a software tool, such as the Linux md5sum command. The advantage of this type of hash is that it can identify known files, such as executable programs or viruses, that hide themselves by changing their names. For example, many people who view or transmit pornographic material change filenames and extensions to obscure the nature of the contents. However, even if a file’s name and extension change, the hash value doesn’t.
A keyed hash set is created by an encryption utility’s secret key. You can use the secret key to create a unique hash value for a file. Although a keyed hash set can’t identify files as nonkeyed hash methods can, it can produce a unique hash set for digital evidence. |
POINTS: |
1 |
REFERENCES: |
163 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 10:57 PM |
DATE MODIFIED: |
8/15/2014 2:57 PM |
|
44. To verify data integrity, different methods of obtaining a unique identity for file data have been developed. Explain how you can use Cyclic Redundancy Check (CRC) and Message Digest 5 (MD5) for this purpose.
ANSWER: |
Both Cyclic Redundancy Check (CRC) and Message Digest 5 (MD5) can be used to generate a hash value based on the contents of a file, which can then be used to determine if file contents have changed. In the event of a change of the file contents, the hash value will not match the original file’s hash value. |
POINTS: |
1 |
REFERENCES: |
163 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 10:23 PM |
DATE MODIFIED: |
8/15/2014 2:59 PM |
|
45. Describe the steps to take if you discover evidence of a crime during a company policy investigation.
ANSWER: |
If you find evidence of a crime during a company policy investigation, first determine whether the incident meets the elements of criminal law. You might have to consult with your corporate attorney to determine whether the situation is a potential crime. Next, inform management of the incident; they might have other concerns, such as protecting confidential business data that might be included with the criminal evidence (called “commingled data”). In this case, coordinate with management and the corporate attorney to determine the best way to protect commingled data. After you submit evidence containing sensitive information to the police, it becomes public record. Public record laws do include exceptions for protecting sensitive corporate information; ultimately, however, a judge decides what to protect.
After you discover illegal activity and document and report the crime, stop your investigation to make sure you don’t violate Fourth Amendment restrictions on obtaining evidence. If the information you supply is specific enough to meet the criteria for a search warrant, the police are responsible for obtaining a warrant that requests any new evidence. If you follow police instructions to gather additional evidence without a search warrant after you report a crime, you run the risk of becoming an agent of law enforcement. Instead, consult with your corporate attorney on how to respond to a police request for information. The police and prosecutor should issue a subpoena for any additional new evidence, which minimizes your exposure to potential civil liability. In addition, you should keep all documentation of evidence collected to investigate an internal company policy violation. |
POINTS: |
1 |
REFERENCES: |
146 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/3/2014 11:35 PM |
DATE MODIFIED: |
10/4/2014 4:48 PM |
|
46. After you record the scene and shut down the system, you bag and tag the evidence. Describe the steps to follow for bagging and tagging evidence.
ANSWER: |
The following steps are to be followed when bagging and tagging evidence:
- Assign one person, if possible, to collect and log all evidence. Minimize the number of people handling evidence to ensure its integrity.
- Tag all the evidence you collect with the current date and time, serial numbers or unique features, make and model, and name of the person who collected it.
- Maintain two separate logs of collected evidence to be reconciled for audit control purposes and to verify everything you have collected.
- Maintain constant control of the collected evidence and the crime or incident scene.
|
POINTS: |
1 |
REFERENCES: |
158 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 12:20 AM |
DATE MODIFIED: |
8/15/2014 3:05 PM |
|
47. At a scene, technical advisors can help direct other investigators to collect evidence correctly. List the responsibilities of technical advisors.
ANSWER: |
The following are responsibilities of technical advisors:
- Know all aspects of the system being seized and searched.
- Direct investigators on how to handle sensitive media and systems to prevent damage.
- Help ensure security of the scene.
- Help document the planning strategy for the search and seizure.
- Conduct ad hoc training for investigators on the technologies and components being seized and searched.
- Document activities during the search and seizure.
- Help conduct the search and seizure.
|
POINTS: |
1 |
REFERENCES: |
159 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 12:27 AM |
DATE MODIFIED: |
10/4/2014 4:48 PM |
|
48. Describe the steps that must be taken to create image files.
ANSWER: |
You use the following steps to create image files:
- Copy all image files to a large drive.
- Start your forensics tool to access and open the image files.
- Run an MD5 or SHA-1 hashing algorithm on the image files to get a digital hash.
- When you finish copying image files to a larger drive, secure the original media in an evidence locker. Don’t work with the original media; it should be stored in a locker that has an evidence custody form. Be sure to fill out the form and date it.
|
POINTS: |
1 |
REFERENCES: |
160 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 12:43 AM |
DATE MODIFIED: |
8/15/2014 3:09 PM |
|
49. With digital evidence, you need to consider how and on what type of media to save it and what type of storage device is recommended to secure it. The media you use to store digital evidence usually depends on how long you need to keep it. If you investigate criminal matters, store the evidence as long as you can. Name five ideal media types on which to store digital data.
ANSWER: |
The ideal media on which to store digital data are:
- CDs
- DVDs
- DVD-Rs
- DVD+Rs
- DVD-RWs
|
POINTS: |
1 |
REFERENCES: |
161 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 1:10 AM |
DATE MODIFIED: |
8/15/2014 3:11 PM |
|
50. Consistent practices help verify your work and enhance your credibility, so you must handle all evidence consistently. Explain why it’s important to apply the same security and accountability controls for evidence in a civil lawsuit as in a major crime.
ANSWER: |
Apply the same security and accountability controls for evidence in a civil lawsuit as a major crime to comply with your state’s rules of evidence or with the Federal Rules of Evidence (FRE). Also, evidence admitted in a criminal case might also be used in a civil suit, and vice versa. |
POINTS: |
1 |
REFERENCES: |
137 |
QUESTION TYPE: |
Subjective Short Answer |
HAS VARIABLES: |
False |
DATE CREATED: |
8/4/2014 4:13 AM |
DATE MODIFIED: |
8/15/2014 3:13 PM |
|
Related
Reviews
There are no reviews yet.