Deck 4: Policies and Procedures

ملء الشاشة (f)
exit full mode
سؤال
In order to protect a cellular phone for evidentiary procedures,transport it in a(n)___________.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is NOT an item generally included in a forensic kit?

A)Flashlight
B)USB external drive
C)General case intake form
D)Latex gloves
سؤال
?Which of the following is one of the bottom-layer examinations you would make on a suspect computer?

A)Extraction of encrypted files
B)Operating system norms
C)Extraction of unallocated space files of interest
D)All of the above
سؤال
What is considered to be the best way to preserve the layout of a crime scene?

A)Write down all information.
B)Use a compact cassette recorder.
C)Ask questions.
D)Photograph it.
سؤال
Include a(n)________ as part of your forensic equipment because it allows you to carry a library of forensic tools and can give you access to the Internet.
سؤال
A(n)________ needs to be completed when reviewing a potential case and determining whether to accept it.
سؤال
Common criteria for accepting a case include all of the following EXCEPT

A)Whether it is a criminal or civil case
B)The law enforcement agency in charge of the case
C)The potential impact upon the organization
D)Liability issues
سؤال
When should the process of documenting e-evidence begin?

A)Upon receipt of the evidence
B)While gathering evidence
C)While forensically investigating the evidence
D)Upon first receiving the call concerning the case
سؤال
Which of the following is NOT one of the areas to be considered when selecting members of a forensic unit?

A)Experience
B)Team player
C)Mental agility
D)Works well under pressure
سؤال
You should ask questions about what types of ________ and ________ are involved because you can save time and mistakes if you take the correct equipment with you.
سؤال
Who has the legal authority to conduct a search in a criminal case?

A)It's decided by the local jurisdiction.
B)It's decided by federal statutes.
C)It's decided by the investigator on site.
D)It's decided by the lead detective on the scene.
سؤال
?The primary consideration in determining where to do the forensic work is always the

A)Estimation of personnel needed
B)Integrity of the evidence
C)Impact of the investigation on the organization
D)Current number of cases being handled
سؤال
Forensic investigators establish generally accepted policies and procedures to ensure that

A)They can bill at the correct rate
B)Technical procedures are well documented
C)All cases will go to trial
D)Both B and C
سؤال
Which of the following would NOT be part of a standard report?

A)Brief summary
B)Body of the report
C)Brief biography of the suspect
D)Conclusion section
سؤال
If you encounter files that have been password protected,one option is to

A)Ask the user to give you the password
B)Reconfigure the BIOS to allow access to the file
C)Try a number of standard passwords to try to find a match
D)Consult a hacker site for help with the password
سؤال
If you find recent files of a particular application but the application itself is not present on the computer,what can you infer?

A)The computer user is not very experienced.
B)The application file belongs on another computer.
C)The application program has been recently installed.
D)The application program is stored on some other storage device.
سؤال
Why is tagging books and magazines at a crime scene considered important?

A)You might wish to subscribe to a few yourself.
B)It isn't important.
C)It allows the investigator to get to know how the person thinks.
D)You might find passwords hidden in the articles.
سؤال
The system BIOS can tell you

A)Hard drive geometry settings
B)What Web sites the user has visited recently
C)The computer's operating system
D)What applications are installed on the computer
سؤال
Training of forensic personnel might include which of the following?

A)Psychological profiling
B)Medical forensics
C)Ballistics
D)iPOD data retrieval
سؤال
The ________ allows police to seize evidence if they see it while lawfully engaged in searching for other evidence.
سؤال
A(n)________ examination is where most of the computer forensic work is performed.
سؤال
The ________ determines which of the computer's media is used to start the computer.
سؤال
Your best bet for decrypting a file is to find out what program was used to encrypt it and obtain the ________ for that software.
سؤال
The ________ of a report contains as much detail and documentation as you can include.
سؤال
The computer's time and date should be compared against a known standard,such as ________.
سؤال
The main reason for file compression is to ________.
سؤال
The ________ of the extraction model is primarily concerned with developing a picture of how the system is set up.
سؤال
A(n)________ examination involves searches of the areas the operating system does not recognize as being normally used.
سؤال
You can use ________ analysis to eliminate common files by comparing them to the same files on your system.
سؤال
With the original evidence safely stored,you should make a(n)________ of the forensic image.
سؤال
Match between columns
Password protected
Uses an algorithm to make readable
Password protected
Needs a word or phrase to unlock the file
Password protected
Data hides in another file
Password protected
Usually mail files
سؤال
Match between columns
What am I looking for?
Identify the operating system or network topology
What am I looking for?
There may be fingerprints or other trace evidence
What am I looking for?
You would use different tools to locate different items such as photographs or spreadsheets
What am I looking for?
This determines how you will extract the data
What am I looking for?
The more skilled the user, the more likely it is that he can alter or destroy evidence
سؤال
Match between columns
Hardware toolkit
Useful for transferring large amounts of data or images
Hardware toolkit
Necessary if there are no convenient plugs
Hardware toolkit
Startup disks, CDs, or USB drives
Hardware toolkit
Used to keep notes or upload photographs
Hardware toolkit
Screwdrivers, pliers, duct tape
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/33
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Policies and Procedures
1
In order to protect a cellular phone for evidentiary procedures,transport it in a(n)___________.
Faraday bag
2
Which of the following is NOT an item generally included in a forensic kit?

A)Flashlight
B)USB external drive
C)General case intake form
D)Latex gloves
C
3
?Which of the following is one of the bottom-layer examinations you would make on a suspect computer?

A)Extraction of encrypted files
B)Operating system norms
C)Extraction of unallocated space files of interest
D)All of the above
B
4
What is considered to be the best way to preserve the layout of a crime scene?

A)Write down all information.
B)Use a compact cassette recorder.
C)Ask questions.
D)Photograph it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
5
Include a(n)________ as part of your forensic equipment because it allows you to carry a library of forensic tools and can give you access to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
6
A(n)________ needs to be completed when reviewing a potential case and determining whether to accept it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
7
Common criteria for accepting a case include all of the following EXCEPT

A)Whether it is a criminal or civil case
B)The law enforcement agency in charge of the case
C)The potential impact upon the organization
D)Liability issues
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
8
When should the process of documenting e-evidence begin?

A)Upon receipt of the evidence
B)While gathering evidence
C)While forensically investigating the evidence
D)Upon first receiving the call concerning the case
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is NOT one of the areas to be considered when selecting members of a forensic unit?

A)Experience
B)Team player
C)Mental agility
D)Works well under pressure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
10
You should ask questions about what types of ________ and ________ are involved because you can save time and mistakes if you take the correct equipment with you.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
11
Who has the legal authority to conduct a search in a criminal case?

A)It's decided by the local jurisdiction.
B)It's decided by federal statutes.
C)It's decided by the investigator on site.
D)It's decided by the lead detective on the scene.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
12
?The primary consideration in determining where to do the forensic work is always the

A)Estimation of personnel needed
B)Integrity of the evidence
C)Impact of the investigation on the organization
D)Current number of cases being handled
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
13
Forensic investigators establish generally accepted policies and procedures to ensure that

A)They can bill at the correct rate
B)Technical procedures are well documented
C)All cases will go to trial
D)Both B and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following would NOT be part of a standard report?

A)Brief summary
B)Body of the report
C)Brief biography of the suspect
D)Conclusion section
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
15
If you encounter files that have been password protected,one option is to

A)Ask the user to give you the password
B)Reconfigure the BIOS to allow access to the file
C)Try a number of standard passwords to try to find a match
D)Consult a hacker site for help with the password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
16
If you find recent files of a particular application but the application itself is not present on the computer,what can you infer?

A)The computer user is not very experienced.
B)The application file belongs on another computer.
C)The application program has been recently installed.
D)The application program is stored on some other storage device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
17
Why is tagging books and magazines at a crime scene considered important?

A)You might wish to subscribe to a few yourself.
B)It isn't important.
C)It allows the investigator to get to know how the person thinks.
D)You might find passwords hidden in the articles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
18
The system BIOS can tell you

A)Hard drive geometry settings
B)What Web sites the user has visited recently
C)The computer's operating system
D)What applications are installed on the computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
19
Training of forensic personnel might include which of the following?

A)Psychological profiling
B)Medical forensics
C)Ballistics
D)iPOD data retrieval
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ________ allows police to seize evidence if they see it while lawfully engaged in searching for other evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n)________ examination is where most of the computer forensic work is performed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ________ determines which of the computer's media is used to start the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
23
Your best bet for decrypting a file is to find out what program was used to encrypt it and obtain the ________ for that software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
24
The ________ of a report contains as much detail and documentation as you can include.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
25
The computer's time and date should be compared against a known standard,such as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
26
The main reason for file compression is to ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
27
The ________ of the extraction model is primarily concerned with developing a picture of how the system is set up.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n)________ examination involves searches of the areas the operating system does not recognize as being normally used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
29
You can use ________ analysis to eliminate common files by comparing them to the same files on your system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
30
With the original evidence safely stored,you should make a(n)________ of the forensic image.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match between columns
Password protected
Uses an algorithm to make readable
Password protected
Needs a word or phrase to unlock the file
Password protected
Data hides in another file
Password protected
Usually mail files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
What am I looking for?
Identify the operating system or network topology
What am I looking for?
There may be fingerprints or other trace evidence
What am I looking for?
You would use different tools to locate different items such as photographs or spreadsheets
What am I looking for?
This determines how you will extract the data
What am I looking for?
The more skilled the user, the more likely it is that he can alter or destroy evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
59
Match between columns
Hardware toolkit
Useful for transferring large amounts of data or images
Hardware toolkit
Necessary if there are no convenient plugs
Hardware toolkit
Startup disks, CDs, or USB drives
Hardware toolkit
Used to keep notes or upload photographs
Hardware toolkit
Screwdrivers, pliers, duct tape
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.