Exam 1: Computer Forensics and Investigations As a Profession

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below: -allows legal counsel to use previous cases similar to the current one because the laws don't yet exist

(Multiple Choice)
4.7/5
(29)

____________________ involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases.

(Short Answer)
4.9/5
(32)

In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.

(Multiple Choice)
4.8/5
(26)

A ____ usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will.

(Multiple Choice)
4.9/5
(35)

Most computer investigations in the private sector involve ____.

(Multiple Choice)
4.7/5
(37)

Briefly describe corporate sabotage.

(Essay)
4.8/5
(42)

The affidavit must be ____ under sworn oath to verify that the information in the affidavit is true.

(Multiple Choice)
4.9/5
(41)

A(n) ____ is a person using a computer to perform routine tasks other than systems administration.

(Multiple Choice)
4.9/5
(36)

In the Pacific Northwest, ____ meets monthly to discuss problems that law enforcement and corporations face.

(Multiple Choice)
4.8/5
(42)

By the 1970s, electronic crimes were increasing, especially in the financial sector.

(True/False)
4.8/5
(35)

After a judge approves and signs a search warrant, it's ready to be executed, meaning you can collect evidence as defined by the warrant.

(True/False)
5.0/5
(34)

The term ____________________ refers to large corporate computing systems that might include disparate or formerly independent systems.

(Short Answer)
4.8/5
(37)

The ____________________ to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.

(Short Answer)
4.8/5
(43)

Without a warning banner, employees might have an assumed ____ when using a company's computer systems and network accesses.

(Multiple Choice)
4.9/5
(37)

Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed.

(Multiple Choice)
4.9/5
(37)

Match each item with a statement below: -sworn statement of support of facts about or evidence of a crime that is submitted to a judge to request a search warrant before seizing evidence

(Multiple Choice)
4.8/5
(40)

The ____________________ provides a record of clues to crimes that have been committed previously.

(Short Answer)
4.8/5
(37)

Briefly describe the main characteristics of public investigations.

(Essay)
4.8/5
(38)

Maintaining ____ means you must form and sustain unbiased opinions of your cases.

(Multiple Choice)
4.9/5
(45)

Match each item with a statement below: -investigates data that can be retrieved from a computer's hard disk or other storage media

(Multiple Choice)
4.9/5
(40)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)