Exam 1: Computer Forensics and Investigations As a Profession
Match each item with a statement below:
-the legal process of proving guilt or innocence in court
C
What questions should an investigator ask to determine whether a computer crime was committed?
In a criminal case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.To determine whether there was a computer crime, an investigator asks questions such as the following: What was the tool used to commit the crime? Was it a simple trespass? Was it a theft, a burglary, or vandalism? Did the perpetrator infringe on someone else's rights by cyberstalking or e-mail harassment?
What is embezzlement?
Embezzlement is a common computer crime, particularly in small firms.Typically, the owner is busy and trusts one person, such as the office manager, to handle daily transactions.When the office manager leaves, the owner discovers that some clients were overbilled or others were not billed at all, and money is missing.Rebuilding the paper and electronic trail can be tedious.Collecting enough evidence to press charges might be beyond the owner's capabilities.
Published company policies provide a(n) ____ for a business to conduct internal investigations.
Your ____ as a computer investigation and forensics analyst is critical because it determines your credibility.
It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.
By the early 1990s, the ____ introduced training on software for forensics investigations.
In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.
Mention examples of groups that should have direct authority to request computer investigations in the corporate environment.
Match each item with a statement below:
-involves selling sensitive or confidential company information to a competitor
What are the three levels of law enforcement expertise established by CTIN?
Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.
To be a successful computer forensics investigator, you must be familiar with more than one computing platform.
Computer investigations and forensics fall into the same category: public investigations.
When you work in the ____________________ group, you test and verify the integrity of standalone workstations and network servers.
Match each item with a statement below:
-specifies who has the legal right to initiate an investigation, who can take possession of evidence, and who can have access to evidence
The law of search and seizure protects the rights of all people, excluding people suspected of crimes.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)