Chapter 4 Flashcards by Sean Sanders (2024)

1

Q

Corporate investigations are typically easier than law enforcement investigations for which of the following reasons?

A

a. Most companies keep inventory databases of all hardware and software used.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

2

Q

n the United States, if a company publishes a policy stating that it reserves the right to inspect computing assets at will, a corporate investigator can conduct covert surveillance on an employee with little cause.

A

T

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

3

Q

If you discover a criminal act, such as murder or child p*rnography, while investigating a corporate policy abuse, the case becomes a criminal investigation and should be referred to law enforcement.

A

T

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

4

Q

As a corporate investigator, you can become an agent of law enforcement when which of the following happens? (Choose all that apply.)

a. You begin to take orders from a police detective without a warrant or subpoena.
b. Your internal investigation has concluded, and you have filed a criminal complaint and turned over the evidence to law enforcement.
c. Your internal investigation begins.

A

A, B

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

5

Q

The plain view doctrine in computer searches is well-established law.

A

F

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

6

Q

If a suspect computer is located in an area that might have toxic chemicals, you must do which of the following? (Choose all that apply.)

a. Coordinate with the HAZMAT team.
b. Determine a way to obtain the suspect computer
c. Assume the suspect computer is contaminated.
d. Do not enter alone

A

a, c

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

7

Q

What are the three rules for a forensic hash?

A

It can’t be predicted, no two files can have the same hash value, and if the file changes, the hash value changes.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

8

Q

In forensic hashes, a collision occurs when ________.

A

two files have the same hash value

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

9

Q

List three items that should be in an initial-response field kit.

A

Small computer toolkit, large-capacity drive, IDE ribbon cables, forensic boot media, laptop IDE 40-to-44 pin adapter, laptop or portable computer, FireWire or USB dual write-protect external bay, flashlight, digital camera or 35mm camera

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

10

Q

When you arrive at the scene, why should you extract only those items that you need to acquire evidence?

A

To minimize how much you have to keep track of at the scene.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

11

Q

Computer peripherals or attachments can contain DNA evidence. True or False?

A

T

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

12

Q

If a suspect computer is running Windows 2000, which of the following can you perform safely?

A

Browsing open applications.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

13

Q

Describe what should be videotaped or sketched at a computer crime scene.

A

Computers, cable connections, overview of scene—anything that might be of interest to the investigation.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

14

Q

Which of the following techniques might be used in covert surveillance?

A

Keylogging, data sniffing.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

15

Q

Commingling evidence means what in a corporate setting?

A

Sensitive corporate information being mixed with data collected as evidence.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

16

Q

Two hashing algorithms commonly used for forensic purposes are_____.

A

MD5 and SHA-1

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

17

Q

Small companies rarely need investigators. True or False?

A

F

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

18

Q

If a company doesn’t distribute a computing use policy stating an employer’s rights to inspect employee’s computers freely, including e-mail and web use, employees have an expectation of privacy. True or False?

A

T

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

19

Q

You have been called to the scene of a fatal car crash where a laptop computer is still running. What type of field kit should you take with you?

A

Initial-response field kit.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

20

Q

You should always answer questions from onlookers at the crime scene? True or False?

A

F

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

21

Q

Automated Fingerprint Identification System (AFIS)

A

A computerized system for identifying fingerprints that’s connected to a central database; used to identify criminal suspects and review thousands of fingerprint samples at high speed.

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

22

Q

A computerized system for identifying fingerprints that’s connected to a central database; used to identify criminal suspects and review thousands of fingerprint samples at high speed.

A

Automated Fingerprint Identification System (AFIS)

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

23

Q

computer-generated records

A

Digital files generated by a computer

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

24

Q

Digital files generated by a computer

A

computer-generated records

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

25

Q

computer-stored records

A

Digital files generated by a person

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

26

Q

Digital files generated by a person

A

computer-stored records

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

27

Q

covert surveillance

A

observing people or places without being detected

How well did you know this?

1

Not at all

2

3

4

5

Perfectly

28

Q

observing people or places without being detected

A

covert surveillance

29

Q

Cyclic Redundancy Check (CRC)

A

A mathematical algorithm that translates a file into a unique hexadecimal value

30

Q

A mathematical algorithm that translates a file into a unique hexadecimal value

A

Cyclic Redundancy Check (CRC)

31

Q

digital evidence

A

Evidence consisting of information stored or transmitted in electronic form

32

Q

Evidence consisting of information stored or transmitted in electronic form

A

digital evidence

33

Q

extensive-response field kit

A

A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers

34

Q

A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers

A

extensive-response field kit

35

Q

What should an extensive-response field kit include?

A

Two or more types of software or hardware computer forensics tools

36

Q

hash value

A

A unique hexadecimal value that identifies a file or drive

37

Q

A unique hexadecimal value that identifies a file or drive

A

hash value

38

Q

hazardous materials (HAZMAT)

A

Chemical, biological, or radiological substances that can cause harm to people

39

Q

Chemical, biological, or radiological substances that can cause harm to people

A

hazardous materials (HAZMAT)

40

Q

initial-response field kit

A

A portable kit containing only the minimum tools needed to perform disk acquisitions and preliminary forensics analysis in the field.

41

Q

A portable kit containing only the minimum tools needed to perform disk acquisitions and preliminary forensics analysis in the field.

A

initial-response field kit

42

Q

innocent information

A

Data that doesn’t contribute to evidence of a crime or violation

43

Q

Data that doesn’t contribute to evidence of a crime or violation

A

innocent information

44

Q

keyed hash set

A

A value created by an encryption utility’s secret key

45

Q

A value created by an encryption utility’s secret key

A

keyed hash set

46

Q

limiting phrase

A

Wording in a search warrant that limits the scope of a search for evidence

47

Q

Wording in a search warrant that limits the scope of a search for evidence

A

limiting phrase

48

Q

low-level investigations

A

Corporate cases that require less investigative effort than a major criminal case

49

Q

Corporate cases that require less investigative effort than a major criminal case

A

low-level investigations

50

Q

Message Digest 5 (MD5)

A

An algorithm that produces a hexadecimal value of a file or storage media.

51

Q

An algorithm that produces a hexadecimal value of a file or storage media.

A

Message Digest 5 (MD5)

52

Q

National Institute of Standards and Technology (NIST)

A

One of the governing bodies responsible for setting standards for some U.S. industries.

53

Q

One of the governing bodies responsible for setting standards for some U.S. industries.

A

National Institute of Standards and Technology (NIST)

54

Q

nonkeyed hash set

A

A unique hash number generated by a software tool and used to identify files

55

Q

A unique hash number generated by a software tool and used to identify files

A

nonkeyed hash set

56

Q

person of interest

A

Someone who might be a suspect or someone with additional knowledge that can provide enough evidence of probable cause for a search warrant or arrest

57

Q

Someone who might be a suspect or someone with additional knowledge that can provide enough evidence of probable cause for a search warrant or arrest

A

person of interest

58

Q

plain view doctrine

A

When conducting a search and seizure, objects in plain view of a law enforcement officer, who has the right to be in position to have that view, are subject to seizure without a warrant and can be introduced as evidence.

59

Q

When conducting a search and seizure, objects in plain view of a law enforcement officer, who has the right to be in position to have that view, are subject to seizure without a warrant and can be introduced as evidence.

A

plain view doctrine

60

Q

probable cause

A

The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.

61

Q

The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.

A

probable cause

62

Q

professional curiosity

A

The motivation for law enforcement and other professional personnel to examine an incident or crime scene to see what happened

63

Q

The motivation for law enforcement and other professional personnel to examine an incident or crime scene to see what happened

A

professional curiosity

64

Q

Scientific Working Group on Digital Evidence (SWGDE)

A

A group that sets standards for recovering, preserving, and examining digital evidence

65

Q

A group that sets standards for recovering, preserving, and examining digital evidence

A

Scientific Working Group on Digital Evidence (SWGDE)

66

Q

Secure Hash Algorithm version 1 (SHA-1)

A

A forensic hashing algorithm created by NIST to determine whether data in a file or storage media has been altered.

67

Q

A forensic hashing algorithm created by NIST to determine whether data in a file or storage media has been altered.

A

Secure Hash Algorithm version 1 (SHA-1)

68

Q

sniffing

A

Detecting data transmissions to and from a suspect’s computer and a network server to determine the type of data being transmitted over a network

69

Q

Detecting data transmissions to and from a suspect’s computer and a network server to determine the type of data being transmitted over a network

A

sniffing

Chapter 4 Flashcards by Sean Sanders (2024)
Top Articles
How to Stake Cardano: Staking Rewards and ADA Wallets | Everstake Blog
Baroda Digital Pre-Approved Personal Loan
Kostner Wingback Bed
Whas Golf Card
Dunhams Treestands
Tyler Sis 360 Louisiana Mo
Moon Stone Pokemon Heart Gold
Satyaprem Ki Katha review: Kartik Aaryan, Kiara Advani shine in this pure love story on a sensitive subject
Restaurer Triple Vitrage
Wausau Marketplace
Derpixon Kemono
Culver's Flavor Of The Day Monroe
Student Rating Of Teaching Umn
Jet Ski Rental Conneaut Lake Pa
Immediate Action Pathfinder
Wordle auf Deutsch - Wordle mit Deutschen Wörtern Spielen
Gas Station Drive Thru Car Wash Near Me
Miss America Voy Forum
Pizza Hut In Dinuba
Me Cojo A Mama Borracha
Iu Spring Break 2024
Pretend Newlyweds Nikubou Maranoshin
Craigslist In Visalia California
Inter-Tech IM-2 Expander/SAMA IM01 Pro
Satisfactory: How to Make Efficient Factories (Tips, Tricks, & Strategies)
Homeaccess.stopandshop
Yog-Sothoth
Il Speedtest Rcn Net
Devotion Showtimes Near Regency Buenaventura 6
Divina Rapsing
HP PARTSURFER - spare part search portal
Poe T4 Aisling
Chicago Pd Rotten Tomatoes
Nail Salon Open On Monday Near Me
Texas Baseball Officially Releases 2023 Schedule
Nobodyhome.tv Reddit
Invalleerkracht [Gratis] voorbeelden van sollicitatiebrieven & expert tips
Vons Credit Union Routing Number
Sofia With An F Mugshot
The power of the NFL, its data, and the shift to CTV
Lyndie Irons And Pat Tenore
Chr Pop Pulse
Tacos Diego Hugoton Ks
John Wick: Kapitel 4 (2023)
Sitka Alaska Craigslist
Rocket Bot Royale Unblocked Games 66
Uno Grade Scale
Marion City Wide Garage Sale 2023
Zalog Forum
32 Easy Recipes That Start with Frozen Berries
Latest Posts
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 5593

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.