Which option below is not a recommendation for securing storage containers?

Which option below is not a recommendation for securing storage containers?




a. the container should be located in a restricted area
b. only authorized access should be allowed, and it should be kept to a minimum
c, evidence containers should remain locked when they aren't under direct supervision
d. rooms with evidence containers should have a secured wireless network






Answer: D

A TEMPEST facility is designed to accomplish which of the following goals?

A TEMPEST facility is designed to accomplish which of the following goals?




a. prevent data loss by maintaining consistent backups
b. shield sensitive computing systems and prevent electronic eavesdropping of computer emission
c. ensure network security from the internet using comprehensive security software
d. protect the integrity of data






Answer: B

What certification program, sponsored by ISC2, requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations?

What certification program, sponsored by ISC2, requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations?




a. certified computer crime investigator
b. certified forensic computer examiner
c. certified cyber forensics professional
d. encase certified examiner





Answer: C

A chain-of-evidence form, which is used to document what has and had not been done with the original evidence and forensic copies of the evidence, is also known as a(n) ________

A chain-of-evidence form, which is used to document what has and had not been done with the original evidence and forensic copies of the evidence, is also known as a(n) ________





a. single-evidence form
b. multi-evidence form
c. evidence custody form
d. evidence tracking form







Answer: C

Which option below is not a standard systems analysis step?

Which option below is not a standard systems analysis step?




a. determine a preliminary design or approach to the case.
b. obtain and copy an evidence drive
c. share evidence with experts outside of the investigation
d. mitigate or minimize the risks





Answer: C

If you turn evidence over to law enforcement and begin working under their direction, you have become an agent of law enforcement, and are subject to the same restrictions on search and seizure as a law enforcement agent.

If you turn evidence over to law enforcement and begin working under their direction, you have become an agent of law enforcement, and are subject to the same restrictions on search and seizure as a law enforcement agent.






Answer: True.

According to the national institute of standards and technology (NIST), digital forensics involves scientifically examining and analyzing data from computer storage media so that it can be used as evidence in court.

According to the national institute of standards and technology (NIST), digital forensics involves scientifically examining and analyzing data from computer storage media so that it can be used as evidence in court.







Answer: False.