Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

MIDTERM STUDY SET ITSY 2343

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
02-07-2022
Written in
2021/2022

MIDTERM STUDY SET ITSY 2343 The file where the bit-stream copy is stored Correct Answer: Bit stream image The decision returned by a jury Correct Answer: Verdict The legal act of acquiring evidence for an investigation Correct Answer: Search and Seizure A professional who secures digital evidence at the scene and ensures its viability while transporting it to the lab Correct Answer: Digital Evidence First Responder Evidence that indicates a suspect is guilty of the crime with which he or she is charged Correct Answer: Inculpatory Evidence The order in which people or positions are notified of a problem; these people or positions have the legal right to initiate an investigation, take possession of evidence, and have access to evidence Correct Answer: Line of Authrity Text displayed on computer screens when people log on to a company computer; this text states ownership of the computer and specifies appropriate use of the machine or Internet access Correct Answer: Warning Banner A form that dedicates a page for each item retrieved for a case; it allows investigators to add more detail about exactly what was done to the evidence each time it was taken from the storage locker Correct Answer: Single Evidence Form In a private-sector environment, the person who has the right to request an investigation, such as the chief security officer or chief intelligence officer Correct Answer: Authorized Requester An expert who analyzes digital evidence and determines whether additional specialists are needed Correct Answer: DES Digital Evidence Specialist Digital forensics and data recovery refer to the same activities. True or False? Correct Answer: False 2. Police in the United States must use procedures that adhere to which of the following? Correct Answer: Fourth Amendment 3. The triad of computing security includes which of the following? Correct Answer: Vulnerability/threat assessment, intrusion detection and incident response, and digital investigation 4. What's the purpose of maintaining a network of digital forensics specialists? Correct Answer: To develop a list of colleagues who specialize in areas different from your own specialties in case youneed help on an investigation. 6. List two items that should appear on a warning banner. Correct Answer: Statements that the organization has the right to monitor what users do, that their e-mail is not personal, and so on 7. Under normal circumstances, a private-sector investigator is considered an agent of law enforcement. True or False? Correct Answer: False 8. List two types of digital investigations typically conducted in a business environment. Correct Answer: Fraud, embezzlement, insider trading, espionage, and e-mail harassment 9. What is professional conduct, and why is it important? Correct Answer: Professional conduct includes ethics, morals, and standards of behavior. It affects your credibility. 10. What's the purpose of an affidavit? Correct Answer: To provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant 11. What are the necessary components of a search warrant? Correct Answer: must specify who, what, when, and where—that is, specifics on place, time, items being searched for, and so forth—and include any supporting materials (affidavits and exhibits, for example). In addition,it must be signed by an impartial judicial officer. In many cases, it can also limit the scope of what can be seized. 12. What are some ways to determine the resources needed for an investigation? Correct Answer: Determine the OS of the suspect computer and list the software needed for the examination. 13. List three items that should be on an evidence custody form. Correct Answer: case number, name of the investigator assigned to the case, nature of the case, location where evidence was obtained, description of the evidence, and so on. 14. Why should you do a standard risk assessment to prepare for an investigation? Correct Answer: To list problems that might happen when conducting an investigation, which can help in planning your case 15. You should always prove the allegations made by the person who hired you. True or False? Correct Answer: False 16. For digital evidence, an evidence bag is typically made of antistatic material. True or False? Correct Answer: True 17. Why should evidence media be write-protected? Correct Answer: To make sure data isn't altered 18. List three items that should be in your case report. Correct Answer: explanation of basic computer and network processes, a narrative of what steps you took, a description of your findings, and log files generated from your analysis tools. 19. Why should you critique your case after it's finished? Correct Answer: To improve your work 20. What do you call a list of people who have had physical possession of the evidence? Correct Answer: Chain of custody 21. Data collected before an attorney issues a memo for an attorney-client privilege case is protected under the confidential work product rule. True or False? Correct Answer: False. All data collected before an attorney issues notice of attorney-client privilege is subject to discovery by opposing counsel.

Show more Read less
Institution
Course

Content preview

MIDTERM STUDY SET ITSY 2343
The file where the bit-stream copy is stored Correct Answer: Bit stream image

The decision returned by a jury Correct Answer: Verdict

The legal act of acquiring evidence for an investigation Correct Answer: Search and Seizure

A professional who secures digital evidence at the scene and ensures its viability while transporting it to
the lab Correct Answer: Digital Evidence First Responder

Evidence that indicates a suspect is guilty of the crime with which he or she is charged Correct Answer:
Inculpatory Evidence

The order in which people or positions are notified of a problem; these people or positions have the
legal right to initiate an investigation, take possession of evidence, and have access to evidence Correct
Answer: Line of Authrity

Text displayed on computer screens when people log on to a company computer; this text states
ownership of the computer and specifies appropriate use of the machine or Internet access Correct
Answer: Warning Banner

A form that dedicates a page for each item retrieved for a case; it allows investigators to add more detail
about exactly what was done to the evidence each time it was taken from the storage locker Correct
Answer: Single Evidence Form

In a private-sector environment, the person who has the right to request an investigation, such as the
chief security officer or chief intelligence officer Correct Answer: Authorized Requester

An expert who analyzes digital evidence and determines whether additional specialists are needed
Correct Answer: DES Digital Evidence Specialist

Digital forensics and data recovery refer to the same activities. True or False? Correct Answer: False

2. Police in the United States must use procedures that adhere to which of the following? Correct
Answer: Fourth Amendment

3. The triad of computing security includes which of the following? Correct Answer: Vulnerability/threat
assessment, intrusion detection and incident response, and digital investigation

4. What's the purpose of maintaining a network of digital forensics specialists? Correct Answer: To
develop a list of colleagues who specialize in areas different from your own specialties in case youneed
help on an investigation.

6. List two items that should appear on a warning banner. Correct Answer: Statements that the
organization has the right to monitor what users do, that their e-mail is not personal, and so on

, 7. Under normal circumstances, a private-sector investigator is considered an agent of law enforcement.
True or False? Correct Answer: False

8. List two types of digital investigations typically conducted in a business environment. Correct Answer:
Fraud, embezzlement, insider trading, espionage, and e-mail harassment

9. What is professional conduct, and why is it important? Correct Answer: Professional conduct includes
ethics, morals, and standards of behavior. It affects your credibility.

10. What's the purpose of an affidavit? Correct Answer: To provide facts in support of evidence of a
crime to submit to a judge when requesting a search warrant

11. What are the necessary components of a search warrant? Correct Answer: must specify who, what,
when, and where—that is, specifics on place, time, items being searched for, and so forth—and include
any supporting materials (affidavits and exhibits, for example). In addition,it must be signed by an
impartial judicial officer. In many cases, it can also limit the scope of what can be seized.

12. What are some ways to determine the resources needed for an investigation? Correct Answer:
Determine the OS of the suspect computer and list the software needed for the examination.

13. List three items that should be on an evidence custody form. Correct Answer: case number, name of
the investigator assigned to the case, nature of the case, location where evidence was obtained,
description of the evidence, and so on.

14. Why should you do a standard risk assessment to prepare for an investigation? Correct Answer: To
list problems that might happen when conducting an investigation, which can help in planning your case

15. You should always prove the allegations made by the person who hired you. True or False? Correct
Answer: False

16. For digital evidence, an evidence bag is typically made of antistatic material. True or False? Correct
Answer: True

17. Why should evidence media be write-protected? Correct Answer: To make sure data isn't altered

18. List three items that should be in your case report. Correct Answer: explanation of basic computer
and network processes, a narrative of what steps you took, a description of your findings, and log files
generated from your analysis tools.

19. Why should you critique your case after it's finished? Correct Answer: To improve your work

20. What do you call a list of people who have had physical possession of the evidence? Correct Answer:
Chain of custody

21. Data collected before an attorney issues a memo for an attorney-client privilege case is protected
under the confidential work product rule. True or False? Correct Answer: False. All data collected before
an attorney issues notice of attorney-client privilege is subject to discovery by opposing counsel.

Written for

Course

Document information

Uploaded on
July 2, 2022
Number of pages
11
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ElonMusk Yale School Of Medicine
Follow You need to be logged in order to follow users or courses
Sold
186
Member since
4 year
Number of followers
163
Documents
1345
Last sold
5 months ago
chemistry

FOR THE BEST ASSIGNMENTS AND HOMEWORKS ,TO HELP AND TUTORING ALL KIND OF EXAMS I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. I'm an expert on major courses especially; All AQA, OCR, A & AS LEVELS AND GCSE, Chemistry, Psychology, Nursing, Mathematics. Human Resource Management. Quality work is my priority. I ensure scholarly standards in my documents. Use my work for GOOD GRADES. In requirement of case studies, test banks, exams and many other studies document our site helps in acquiring them all. If in need of any revision document you can go to the inbox and you will be attended to right away. SUCCESS and BEST OF LUCK.

Read more Read less
4.2

42 reviews

5
27
4
7
3
3
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions