Chapter 4 Flashcards

1
Q

Corporate investigations are typically easier than law enforcement investigations for which of the following reasons?

A

a. Most companies keep inventory databases of all hardware and software used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

n the United States, if a company publishes a policy stating that it reserves the right to inspect computing assets at will, a corporate investigator can conduct covert surveillance on an employee with little cause.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If you discover a criminal act, such as murder or child pornography, while investigating a corporate policy abuse, the case becomes a criminal investigation and should be referred to law enforcement.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As a corporate investigator, you can become an agent of law enforcement when which of the following happens? (Choose all that apply.)

a. You begin to take orders from a police detective without a warrant or subpoena.
b. Your internal investigation has concluded, and you have filed a criminal complaint and turned over the evidence to law enforcement.
c. Your internal investigation begins.

A

A, B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The plain view doctrine in computer searches is well-established law.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If a suspect computer is located in an area that might have toxic chemicals, you must do which of the following? (Choose all that apply.)

a. Coordinate with the HAZMAT team.
b. Determine a way to obtain the suspect computer
c. Assume the suspect computer is contaminated.
d. Do not enter alone

A

a, c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three rules for a forensic hash?

A

It can’t be predicted, no two files can have the same hash value, and if the file changes, the hash value changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In forensic hashes, a collision occurs when ________.

A

two files have the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List three items that should be in an initial-response field kit.

A

Small computer toolkit, large-capacity drive, IDE ribbon cables, forensic boot media, laptop IDE 40-to-44 pin adapter, laptop or portable computer, FireWire or USB dual write-protect external bay, flashlight, digital camera or 35mm camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When you arrive at the scene, why should you extract only those items that you need to acquire evidence?

A

To minimize how much you have to keep track of at the scene.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer peripherals or attachments can contain DNA evidence. True or False?

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If a suspect computer is running Windows 2000, which of the following can you perform safely?

A

Browsing open applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe what should be videotaped or sketched at a computer crime scene.

A

Computers, cable connections, overview of scene—anything that might be of interest to the investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following techniques might be used in covert surveillance?

A

Keylogging, data sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Commingling evidence means what in a corporate setting?

A

Sensitive corporate information being mixed with data collected as evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two hashing algorithms commonly used for forensic purposes are_____.

A

MD5 and SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Small companies rarely need investigators. True or False?

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If a company doesn’t distribute a computing use policy stating an employer’s rights to inspect employee’s computers freely, including e-mail and web use, employees have an expectation of privacy. True or False?

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You have been called to the scene of a fatal car crash where a laptop computer is still running. What type of field kit should you take with you?

A

Initial-response field kit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You should always answer questions from onlookers at the crime scene? True or False?

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Automated Fingerprint Identification System (AFIS)

A

A computerized system for identifying fingerprints that’s connected to a central database; used to identify criminal suspects and review thousands of fingerprint samples at high speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A computerized system for identifying fingerprints that’s connected to a central database; used to identify criminal suspects and review thousands of fingerprint samples at high speed.

A

Automated Fingerprint Identification System (AFIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

computer-generated records

A

Digital files generated by a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Digital files generated by a computer

A

computer-generated records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
computer-stored records
Digital files generated by a person
26
Digital files generated by a person
computer-stored records
27
covert surveillance
observing people or places without being detected
28
observing people or places without being detected
covert surveillance
29
Cyclic Redundancy Check (CRC)
A mathematical algorithm that translates a file into a unique hexadecimal value
30
A mathematical algorithm that translates a file into a unique hexadecimal value
Cyclic Redundancy Check (CRC)
31
digital evidence
Evidence consisting of information stored or transmitted in electronic form
32
Evidence consisting of information stored or transmitted in electronic form
digital evidence
33
extensive-response field kit
A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers
34
A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers
extensive-response field kit
35
What should an extensive-response field kit include?
Two or more types of software or hardware computer forensics tools
36
hash value
A unique hexadecimal value that identifies a file or drive
37
A unique hexadecimal value that identifies a file or drive
hash value
38
hazardous materials (HAZMAT)
Chemical, biological, or radiological substances that can cause harm to people
39
Chemical, biological, or radiological substances that can cause harm to people
hazardous materials (HAZMAT)
40
initial-response field kit
A portable kit containing only the minimum tools needed to perform disk acquisitions and preliminary forensics analysis in the field.
41
A portable kit containing only the minimum tools needed to perform disk acquisitions and preliminary forensics analysis in the field.
initial-response field kit
42
innocent information
Data that doesn't contribute to evidence of a crime or violation
43
Data that doesn't contribute to evidence of a crime or violation
innocent information
44
keyed hash set
A value created by an encryption utility's secret key
45
A value created by an encryption utility's secret key
keyed hash set
46
limiting phrase
Wording in a search warrant that limits the scope of a search for evidence
47
Wording in a search warrant that limits the scope of a search for evidence
limiting phrase
48
low-level investigations
Corporate cases that require less investigative effort than a major criminal case
49
Corporate cases that require less investigative effort than a major criminal case
low-level investigations
50
Message Digest 5 (MD5)
An algorithm that produces a hexadecimal value of a file or storage media.
51
An algorithm that produces a hexadecimal value of a file or storage media.
Message Digest 5 (MD5)
52
National Institute of Standards and Technology (NIST)
One of the governing bodies responsible for setting standards for some U.S. industries.
53
One of the governing bodies responsible for setting standards for some U.S. industries.
National Institute of Standards and Technology (NIST)
54
nonkeyed hash set
A unique hash number generated by a software tool and used to identify files
55
A unique hash number generated by a software tool and used to identify files
nonkeyed hash set
56
person of interest
Someone who might be a suspect or someone with additional knowledge that can provide enough evidence of probable cause for a search warrant or arrest
57
Someone who might be a suspect or someone with additional knowledge that can provide enough evidence of probable cause for a search warrant or arrest
person of interest
58
plain view doctrine
When conducting a search and seizure, objects in plain view of a law enforcement officer, who has the right to be in position to have that view, are subject to seizure without a warrant and can be introduced as evidence.
59
When conducting a search and seizure, objects in plain view of a law enforcement officer, who has the right to be in position to have that view, are subject to seizure without a warrant and can be introduced as evidence.
plain view doctrine
60
probable cause
The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.
61
The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.
probable cause
62
professional curiosity
The motivation for law enforcement and other professional personnel to examine an incident or crime scene to see what happened
63
The motivation for law enforcement and other professional personnel to examine an incident or crime scene to see what happened
professional curiosity
64
Scientific Working Group on Digital Evidence (SWGDE)
A group that sets standards for recovering, preserving, and examining digital evidence
65
A group that sets standards for recovering, preserving, and examining digital evidence
Scientific Working Group on Digital Evidence (SWGDE)
66
Secure Hash Algorithm version 1 (SHA-1)
A forensic hashing algorithm created by NIST to determine whether data in a file or storage media has been altered.
67
A forensic hashing algorithm created by NIST to determine whether data in a file or storage media has been altered.
Secure Hash Algorithm version 1 (SHA-1)
68
sniffing
Detecting data transmissions to and from a suspect's computer and a network server to determine the type of data being transmitted over a network
69
Detecting data transmissions to and from a suspect's computer and a network server to determine the type of data being transmitted over a network
sniffing