Test 1 Flashcards

1
Q

A corporate employer may consent to a search of an employee’s computer and peripherals if the employer has common authority over the equipment.
1) True
2 )False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a wireless interface standard?
A) eSATA

B) Bluetooth

C) FireWire

D) USB

A

B) Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer forensic examiner is qualified to do all of the following except which one?

A)

Provide advice to attorneys about computer-related evidence in court

B)

Help prepare a court case

C)

Serve as an expert witness in a court case

D)

Determine the outcome of a court case

A

D) Determine the outcome of a court case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital evidence is only useful in a Court of Law.

1) True
2) False

A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prosecuting attorneys should have training on electronic discovery and digital data, and how to properly present computer evidence in a court of law.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attorneys and police are encountering progressively more digital evidence in their work.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What device tends to offer the highest data capacity?

A)

Blu-ray Disc

B)

USB flash drive

C)

External hard drive

D)

Jaz disk

A

C)

External hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a computer forensic professional assists law enforcement in an investigation, the forensic professional is bound by the same restrictions as law enforcement personnel.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer professionals who take inappropriate actions when they encounter child pornography on their employer’s systems can lose their jobs or break the law.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a type of non-technical attack that plays on human nature to get people to divulge private or sensitive information, such as a password. (two words)______

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Video surveillance can be a form of digital evidence.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Forensic science is the application of science to investigation and prosecution of crime or to the just resolution of conflict.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is most likely to hire a computer forensic professional to gather computer evidence of possible fraud in accident, arson, and workman’s compensation cases?

A)

Civil litigators

B)

Individuals

C)

Insurance companies

D)

Criminal prosecutors

A

C) Insurance Companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following roles may involve computer forensics? (Choose all that apply.)

A)

Private investigator

B)

Corporate compliance professional

C)

Law enforcement official

D)

Medical examiner

E)

A and B only

A

A)

Private investigator

B)

Corporate compliance professional

C)

Law enforcement official

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____________ is a USB device that intercepts, records, and stores everything typed on a keyboard into a file. This includes all keystrokes, even passwords

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Many states have laws that require businesses to protect sensitive personal and financial data, and to report data breaches.

1) True
2) False

A

1) True

17
Q

Which operating systems are based on Unix? (Choose all that apply.)

1)

Windows 7

2)

Linux

3)

Mac OS X

4)

Windows Server 2008

A

2)

Linux

3)

Mac OS X

18
Q

The most common Microsoft systems a computer forensic investigator will encounter today are Windows XP, Windows Vista, and Windows 7.

1) True
2) False

A

1) True

19
Q

Information stored on devices such as hard disks and USB flash drives is ___________, which means it persists intact when such a device is powered off (and sometimes even after erasure). (one word, or two words separated by a dash)

A

nonvolatile

20
Q

Computers were involved in the investigations into both World Trade Center attacks.

1) True
2) False

A

1) True

21
Q

Digital evidence can oftentimes be duplicated exactly without any changes to the original data.

1) True
2) False

A

1) True

22
Q

Even digital investigations that do not result in legal action can benefit from principles of forensic science.

1) True
2) False

A

1) True

23
Q

When a file is deleted from a hard drive, it can often be recovered.

1) True
2) False

A

1) True

24
Q

Mobile devices generally use flash memory instead of a hard drive for storage to keep them as light and small as possible.

1) True
2) False

A

1) True

25
Q

All forensic examinations should be performed on the original digital evidence.

1) True
2) False

A

2) False