Which option below is not a recommendation for securing storage containers?
a. the container should be located in a restricted area
b. only authorized access should be allowed, and it should be kept to a minimum
c, evidence containers should remain locked when they aren't under direct supervision
d. rooms with evidence containers should have a secured wireless network
In order to qualify for the certified computer crime investigator, basic level certification, candidates must provide documentation of at least ________ cases in which they participated.
In order to qualify for the advanced certified computer forensic technician certification, a candidate must have ________ years of hands-on experience in computer forensics investigations.
A TEMPEST facility is designed to accomplish which of the following goals?
a. prevent data loss by maintaining consistent backups
b. shield sensitive computing systems and prevent electronic eavesdropping of computer emission
c. ensure network security from the internet using comprehensive security software
d. protect the integrity of data
________ is responsible for creating an monitoring lab policies for staff, and provides a safe, and provides a safe and secure workplace for staff and evidence.
a. the lab manager
b. the lab investigator
c. the lab secretary
d. the lab steward
In order to qualify for the certified computer forensic technician, basic level certification, how many hours of computer forensics training are required?
What certification program, sponsored by ISC2, requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations?
a. certified computer crime investigator
b. certified forensic computer examiner
c. certified cyber forensics professional
d. encase certified examiner
The shielding of sensitive computing systems and prevention of electronic eavesdropping of any computer emissions is known as FAUST by the U.S. department of defense.
What tool, currently maintained by the IRS criminal investigation division and limited to use by law enforcement, can analyze and read special files that are copies of a disk?
a. AccessData forensic toolkit
b. DeepScan
c. ILook
d. Photorect
A chain-of-evidence form, which is used to document what has and had not been done with the original evidence and forensic copies of the evidence, is also known as a(n) ________
a. single-evidence form
b. multi-evidence form
c. evidence custody form
d. evidence tracking form
Which option below is not a standard systems analysis step?
a. determine a preliminary design or approach to the case.
b. obtain and copy an evidence drive
c. share evidence with experts outside of the investigation
d. mitigate or minimize the risks
If a police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit a(n) ________
If you turn evidence over to law enforcement and begin working under their direction, you have become an agent of law enforcement, and are subject to the same restrictions on search and seizure as a law enforcement agent.
According to the national institute of standards and technology (NIST), digital forensics involves scientifically examining and analyzing data from computer storage media so that it can be used as evidence in court.