meh Flashcards
(43 cards)
This involves recovering information that could have been deleted by mistake or lost during a power outage for example.
data recovery
This is the process of obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases.
Computer forensics
This kind of investigation usually involves criminal cases and government agencies
public investigations
This refers to the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence
chain of custody
The witness or victim is often referred to as this. He or she makes an allegation to the police (an accusation or supposition of fact that a crime has been committed).
Complainant
This is a sworn statement of support of facts about or evidence of a crime is submitted to a judge with the request for a search warrant before seizing evidence.
affidavit
Police officers may have different _____ of expertise or certifications.
levels
Your professional ______ as a computer investigation and forensics analyst is critical because it determines your credibility. Professional _____ includes ethics, morals, and standards of behavior. Note: it’s the same word twice.
conduct
Part of the evidence gathering process involves keeping a form called an ___________ form.
evidence
To secure and catalog the evidence contained in large computer components, you can use large ______ bags, tape, tags, labels, and other products available from police supply
evidence bags
This is a bit-by-bit copy (also known as a sector copy) of the original drive or storage medium and is an exact duplicate.
Bit-stream copy
The target disk that is used to copy evidence data should be at least _______ the size of the evidence disk
1.5x
This is the acronym of the name of Windows 8’s file-system
ReFS
At minimum, a forensics lab should have a __________ log listing people who have accessed the lab
visitor’s log
A _______ ______ plan ensures that you can restore your forensic lab’s workstations and file servers to their original condition if a catastrophic failure occurs.
disaster recovery
The process of recording all updates made on a lab’s workstations is called __________ management.
config/change
This storage format is a universal format that is fast and is able to ignore minor data read errors on a source drive.
raw format
One can validate digital evidence using a ________ algorithm such as MD5 or SHA-1
hashing
This RAID level is made up of two disks and if one drive fails, the OS switches to the other disk. The contents on the two disks is identical.
raid-1
Only ______ person (how many?) should collect and catalog digital evidence at a crime scene or lab.
1
________ is an out-of-court statement that is offered to prove the truth of the matter asserted in the statement.
hearsay
To establish authorship of digital evidence in some cases, attorneys can use __________ evidence, which requires finding other clues associated with the suspect’s computer or location.
circumstantial
________ cause refers to the standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.
probable
This is the file system that was commonly used in Windows 95, 98, Me, 200, XP, and Vista. Disks could be as large as 2TB.
fat-32