Exam 1: Computer Forensics and Investigations As a Profession

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below: -yields information about how a perpetrator or an attacker gained access to a network

(Multiple Choice)
4.9/5
(38)

The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.

(Multiple Choice)
4.8/5
(35)

What text can be used in internal warning banners?

(Essay)
4.8/5
(35)

Briefly describe the main characteristics of private investigations.

(Essay)
4.7/5
(42)

In addition to warning banners that state a company's rights of computer ownership, businesses should specify a(n) ____ who has the power to conduct investigations.

(Multiple Choice)
4.8/5
(36)

____ involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring.

(Multiple Choice)
4.9/5
(39)

The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.

(Multiple Choice)
4.9/5
(37)

Match each item with a statement below: -organization that exchanges information about techniques related to computer investigations and security

(Multiple Choice)
4.9/5
(34)

____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.

(Multiple Choice)
4.8/5
(38)

Match each item with a statement below: -recognizes file types and retrieves lost or deleted files

(Multiple Choice)
4.8/5
(34)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)