Guide to Network Security

Computing

Quiz 12 :

Digital Forensics

Quiz 12 :

Digital Forensics

Question Type
search
arrow
Who is responsible for collecting copies or images of digital evidence?
Free
Multiple Choice
Answer:

Answer:

C

Tags
Choose question tag
close menu
arrow
Media that is used to collect digital evidence must be forensically ____.
Free
Multiple Choice
Answer:

Answer:

A

Tags
Choose question tag
close menu
arrow
The disadvantage of hardware tools specialized for the purpose of copying disks is that they are generally slower.
Free
True False
Answer:

Answer:

False

Tags
Choose question tag
close menu
arrow
When prioritizing collected evidence, which term refers to the likelihood that the information will be useful?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A(n) ____ is used to sniff network traffic.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which material presents a gray area of ownership?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
In a dead acquisition, an investigator seeks to obtain a forensic image of the disk or device.
True False
Answer:
Tags
Choose question tag
close menu
arrow
In large organizations, ____ know operating systems and networks as well as how to interpret the information gleaned by the examiners.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
An organization's ____ policy must spell out the procedures for initiating the investigative process, including management approvals.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
In large organizations, ____ are skilled in the operations of particular tools used to gather the analysis information.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Hardware write blockers have the advantage of having been vetted more often in legal cases.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which form documents the team's activities during evidence collection?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
The ____ handles certain cases involving credit card fraud and identity theft.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Who is responsible for maintaining control of the field evidence log and locker?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
If an organization routinely searches every employee's computer or if it conducts truly random searches and uncovers potential evidentiary material, then the findings are admissible in any legal proceeding.
True False
Answer:
Tags
Choose question tag
close menu
arrow
The ____ handles computer crimes that are categorized as felonies.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
One of the more perplexing problems in collecting digital data concerns so-called volatile information, such as the contents of a ____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Countering efforts by foreign countries to steal our nation's secrets, evaluating the capabilities of terrorists in a digital age, and ____ are the FBI's highest priorities.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
In a live acquisition, the investigator has a good idea of what the attacker did to the system during the compromise.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Information collected in such a way that the information will be usable in a criminal or civil proceeding is known as ____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 50