Exam 1: Understanding the Digital Forensics Profession and Investigations
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
What is the difference between a Digital Evidence First Responder (DEFR) and a Digital Evidence Specialist (DES)?
Free
(Essay)
4.8/5
(34)
Correct Answer:
A Digital Evidence First Responder (DEFR) has the skill and training to arrive on an incident scene, assess the situation, and take precautions to acquire and preserve evidence. A Digital Evidence Specialist (DES) has the skill to analyze the data and determine when another specialist should be called in to assist with the analysis.
According to the National Institute of Standards and Technology (NIST), digital forensics involves scientifically examining and analyzing data from computer storage media so that it can be used as evidence in court.
Free
(True/False)
4.8/5
(37)
Correct Answer:
False
_______ is not recommended for a digital forensics workstation.
Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
D
If you turn evidence over to law enforcement and begin working under their direction, you have become an agent of law enforcement, and are subject to the same restrictions on search and seizure as a law enforcement agent.
(True/False)
4.9/5
(54)
Which option below is not a standard systems analysis step?
(Multiple Choice)
4.8/5
(43)
If a police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit a(n) _______.
(Multiple Choice)
4.8/5
(43)
_______ must be included in an affidavit to support an allegation in order to justify a warrant.
(Multiple Choice)
4.8/5
(28)
All suspected industrial espionage cases should be treated as civil case investigations.
(True/False)
5.0/5
(40)
What must be done if data is found in the form of binary files, such as CAD drawings?
(Essay)
4.9/5
(37)
What tool, currently maintained by the IRS Criminal Investigation Division and limited to use by law enforcement, can analyze and read special files that are copies of a disk?
(Multiple Choice)
4.8/5
(46)
_______ is not one of the functions of the investigations triad.
(Multiple Choice)
4.9/5
(41)
Why must all evidence that is collected be treated with the highest level of security and accountability, even if the evidence is regarding an internal abuse investigation within an organization?
(Essay)
4.9/5
(34)
When conducting a digital forensics analysis under _______________ rules for an attorney, you must keep all findings confidential.
(Short Answer)
4.9/5
(42)
Which amendment to the U.S. Constitution protects everyone's right to be secure in their person, residence, and property from search and seizure?
(Multiple Choice)
4.7/5
(28)
After a judge approves and signs a search warrant, the _______ is responsible for the collection of evidence as defined by the warrant.
(Multiple Choice)
4.7/5
(33)
Signed into law in 1973, the _______ was/ were created to ensure consistency in federal proceedings.
(Multiple Choice)
4.8/5
(32)
Match the following terms with the correct definitions below:
-?Evidence that indicates a suspect is guilty of the crime with which he or she is charged
(Multiple Choice)
4.8/5
(29)
Typically, the _____________ requires a bootable DVD or USB flash drive that runs an independent OS in a suspect computer's RAM, with the goal of preserving data during an acquisition.
(Short Answer)
4.9/5
(39)
The term _______ describes a database containing informational records about crimes that have been committed previously by a criminal.
(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)