QUESTIONS AND ANSWERS 2025
EXAM GRADED A+
The is responsible for analyzing data and determining when another
specialist should be called in to assist with analysis.
a. Digital Evidence Specialist
b. Digital Evidence Analyst
c Digital Evidence Examiner
d. Digital Evidence First Responder - ANSWER- Digital Evidence
Specialist
What tool, currently maintained by tha IRS Criminal Investigation
Division and limited to use by law enforcement, can analyze and read
special files that are copies ot a disk?
a. ILook
b. Photorec
,c. DeepScan
d. AccessData Forensic Toolkit - ANSWER- ILook
Which option below is not a standard systems analysis step?
a. Mitigate or minimize the risks.
b Obtain and copy an evidence drive
c Share evidence with experts outside of the investigation.
d. Determine a preliminary design or approach to the case. - ANSWER-
Share evidence with experts outside of the investigation.
A chain-of-evidence form, which is used to document what has and has
not been done with the original evidence and forensic copies of the
evidence, is also known as a(n)
Answers:
a. evidence tracking form
b. evidence custody form
c single-evidence form
d. multi-evidence form - ANSWER- evidence custody form
All suspected industrial espionage cases should be treated as civil case
investigations. True or False - ANSWER- false
,must be Included in an affidavit to support an allegation in order to
justify a warrant Answers:
a. Exhibits
b. Witnesses
c. Verdicts
d. Subpoenas - ANSWER- exhibits
Within a computing investigation, the ability to perform a series of steps
again and again to produce the same results IS known as
a. verifiable reporting
b repeatable findings
c. reloadable steps
d evidence repofiing - ANSWER- repeatable findings
Which amendment to the U.S. Constitution protects everyone's right to
be secure in their person, residence, and property from search and
seizure?
a Fifth Amendment
b Second Amendment
C First Amendment
d Fourth Amendment - ANSWER- Fourth Amendment
, Most digital investigations in the private sector involve misuse of
computing assets
True
False - ANSWER- true
The sale of sensitive or confidential company information to a
competitor is known as
a industrial betrayal
b industrial espionage
c industrial sabotage
d industrial collusion - ANSWER- industrial espionage
Which option below is not a standard systems analysis step?
a. Mitigate or minimize the risks
b. Obtain and copy an evidence drive.
c Determine a preliminary design or approach to the case.
d Share evidence with experts outside of the investigation. - ANSWER-
Share evidence with experts outside of the investigation.
A chain-of-evidence form, which is used to document what has and has
not been done with the original evidence and torensic copies ot the
evidence, is also known as a(n)