Test 1 Flashcards

1
Q

A corporate employer may consent to a search of an employee’s computer and peripherals if the employer has common authority over the equipment.
1) True
2 )False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a wireless interface standard?
A) eSATA

B) Bluetooth

C) FireWire

D) USB

A

B) Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer forensic examiner is qualified to do all of the following except which one?

A)

Provide advice to attorneys about computer-related evidence in court

B)

Help prepare a court case

C)

Serve as an expert witness in a court case

D)

Determine the outcome of a court case

A

D) Determine the outcome of a court case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital evidence is only useful in a Court of Law.

1) True
2) False

A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prosecuting attorneys should have training on electronic discovery and digital data, and how to properly present computer evidence in a court of law.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attorneys and police are encountering progressively more digital evidence in their work.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What device tends to offer the highest data capacity?

A)

Blu-ray Disc

B)

USB flash drive

C)

External hard drive

D)

Jaz disk

A

C)

External hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a computer forensic professional assists law enforcement in an investigation, the forensic professional is bound by the same restrictions as law enforcement personnel.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer professionals who take inappropriate actions when they encounter child pornography on their employer’s systems can lose their jobs or break the law.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a type of non-technical attack that plays on human nature to get people to divulge private or sensitive information, such as a password. (two words)______

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Video surveillance can be a form of digital evidence.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Forensic science is the application of science to investigation and prosecution of crime or to the just resolution of conflict.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is most likely to hire a computer forensic professional to gather computer evidence of possible fraud in accident, arson, and workman’s compensation cases?

A)

Civil litigators

B)

Individuals

C)

Insurance companies

D)

Criminal prosecutors

A

C) Insurance Companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following roles may involve computer forensics? (Choose all that apply.)

A)

Private investigator

B)

Corporate compliance professional

C)

Law enforcement official

D)

Medical examiner

E)

A and B only

A

A)

Private investigator

B)

Corporate compliance professional

C)

Law enforcement official

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____________ is a USB device that intercepts, records, and stores everything typed on a keyboard into a file. This includes all keystrokes, even passwords

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Many states have laws that require businesses to protect sensitive personal and financial data, and to report data breaches.

1) True
2) False

17
Q

Which operating systems are based on Unix? (Choose all that apply.)

1)

Windows 7

2)

Linux

3)

Mac OS X

4)

Windows Server 2008

A

2)

Linux

3)

Mac OS X

18
Q

The most common Microsoft systems a computer forensic investigator will encounter today are Windows XP, Windows Vista, and Windows 7.

1) True
2) False

19
Q

Information stored on devices such as hard disks and USB flash drives is ___________, which means it persists intact when such a device is powered off (and sometimes even after erasure). (one word, or two words separated by a dash)

A

nonvolatile

20
Q

Computers were involved in the investigations into both World Trade Center attacks.

1) True
2) False

21
Q

Digital evidence can oftentimes be duplicated exactly without any changes to the original data.

1) True
2) False

22
Q

Even digital investigations that do not result in legal action can benefit from principles of forensic science.

1) True
2) False

23
Q

When a file is deleted from a hard drive, it can often be recovered.

1) True
2) False

24
Q

Mobile devices generally use flash memory instead of a hard drive for storage to keep them as light and small as possible.

1) True
2) False

25
All forensic examinations should be performed on the original digital evidence. 1) True 2) False
2) False