100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

CTC328 Midterm Review Exam 2025 Questions and Answers

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
21-05-2025
Written in
2024/2025

CTC328 Midterm Review Exam 2025 Questions and Answers Digital forensics and data recovery refer to the same activities. True or False? - ANS False Police in the United States must use procedures that adhere to which of the following? a. Third Amendment b. Fourth Amendment c. First Amendment d. None of the above - ANS b. Fourth Amendment The triad of computing security includes which of the following? a. Detection, response, and monitroing b. Vulnerability assessment, detection, monitoring c. Vulnerability/threat assessment, intrusion detection and incident response, and digital investigation d. Vulnerability assessment, intrusion response, and monitoring - ANS Vulnerability/threat assessment, intrusion detection and incident response, and digital investigation What's the purpose of maintaining a network of digital forensics specialists? - ANS To develop a list of colleagues who specialize in areas different from your own specialties in case you need help on an investigation. Policies can address rules for which of the following? Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. a. When you can log on to a company network from home b.The internet sites you can or can't access c. The amount of personal e-mail you can send d. Any of the above - ANS d. Any of the above List two items that should appear on a warning banner. - ANS Statements that the organization has the right to monitor what users do, that their e-mail is not personal, and so on Under normal circumstances, a private-sector investigator is considered an agent of law enforcement. True or False? - ANS False List two types of digital investigations typically conducted in a business environment. - ANS Fraud, embezzlement, insider trading, espionage, and e-mail harassment What is professional conduct, and why is it important? - ANS Professional conduct includes ethics, morals, and standards of behavior. It affects your credibility. What's the purpose of an affidavit? - ANS To provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant What are the necessary components of a search warrant? - ANS A search warrant must specify who, what, when, and where—that is, specifics on place, time, items being searched for, and so forth—and include any supporting materials (affidavits and exhibits, for example). In addition, a search warrant must be signed by an impartial judicial officer. In many cases, a search warrant can limit the scope of what can be seized. What are some ways to determine the resources needed for an investigation? - ANS Determine the OS of the suspect computer and list the software needed for the examination. Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. List three items that should be on an evidence custody form. - ANS Answers include case number, name of the investigator assigned to the case, nature of the case, location where evidence was obtained, description of the evidence, and so on. Why should you do a standard risk assessment to prepare for an investigation? - ANS To list problems that might happen when conducting an investigation, which can help in planning your case You should always prove the allegations made by the person who hired you. True or False? - ANS False For digital evidence, an evidence bag is typically made of antistatic material. True or False? - ANS True Why should evidence media be write-protected? - ANS To make sure data isn't altered List three items that should be in your case report. - ANS Answers can include an explanation of basic computer and network processes, a narrative of what steps you took, a description of your findings, and log fi

Show more Read less
Institution
CTC 328
Course
CTC 328










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CTC 328
Course
CTC 328

Document information

Uploaded on
May 21, 2025
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CTC328 Midterm Review Exam 2025
Questions and Answers




Digital forensics and data recovery refer to the same activities. True or False? - ANS False


Police in the United States must use procedures that adhere to which of the following?
a. Third Amendment
b. Fourth Amendment
c. First Amendment

d. None of the above - ANS b. Fourth Amendment


The triad of computing security includes which of the following?
a. Detection, response, and monitroing
b. Vulnerability assessment, detection, monitoring
c. Vulnerability/threat assessment, intrusion detection and incident response, and digital
investigation

d. Vulnerability assessment, intrusion response, and monitoring - ANS Vulnerability/threat
assessment, intrusion detection and incident response, and digital investigation



What's the purpose of maintaining a network of digital forensics specialists? - ANS To
develop a list of colleagues who specialize in areas different from your own specialties in case
you need help on an investigation.


Policies can address rules for which of the following?


Pg. 1 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

,a. When you can log on to a company network from home
b.The internet sites you can or can't access
c. The amount of personal e-mail you can send

d. Any of the above - ANS d. Any of the above



List two items that should appear on a warning banner. - ANS Statements that the
organization has the right to monitor what users do, that their e-mail is not personal, and so on


Under normal circumstances, a private-sector investigator is considered an agent of law
enforcement. True or False? - ANS False


List two types of digital investigations typically conducted in a business environment. -
ANS Fraud, embezzlement, insider trading, espionage, and e-mail harassment



What is professional conduct, and why is it important? - ANS Professional conduct includes
ethics, morals, and standards of behavior. It affects your credibility.



What's the purpose of an affidavit? - ANS To provide facts in support of evidence of a crime
to submit to a judge when requesting a search warrant



What are the necessary components of a search warrant? - ANS A search warrant must
specify who, what, when, and where—that is, specifics on place, time, items being searched for,
and so forth—and include any supporting materials (affidavits and exhibits, for example). In
addition, a search warrant must be signed by an impartial judicial officer. In many cases, a
search warrant can limit the scope of what can be seized.


What are some ways to determine the resources needed for an investigation? -
ANS Determine the OS of the suspect computer and list the software needed for the
examination.



Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

, List three items that should be on an evidence custody form. - ANS Answers include case
number, name of the investigator assigned to the case, nature of the case, location where
evidence was obtained, description of the evidence, and so on.



Why should you do a standard risk assessment to prepare for an investigation? - ANS To list
problems that might happen when conducting an investigation, which can help in planning your
case


You should always prove the allegations made by the person who hired you. True or False? -
ANS False


For digital evidence, an evidence bag is typically made of antistatic material. True or False? -
ANS True



Why should evidence media be write-protected? - ANS To make sure data isn't altered



List three items that should be in your case report. - ANS Answers can include an explanation
of basic computer and network processes, a narrative of what steps you took, a description of
your findings, and log files generated from your analysis tools.



Why should you critique your case after it's finished? - ANS To improve your work


What do you call a list of people who have had physical possession of the evidence? -
ANS Chain of custody


Data collected before an attorney issues a memo for an attorney-client privilege case is
protected under the confidential work product rule. True or False? - ANS False. All data
collected before an attorney issues notice of attorney-client privilege is subject to discovery by
opposing counsel.



Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StarGuide Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
1 year
Number of followers
0
Documents
2591
Last sold
2 weeks ago
FIRST CLASS GALORE

Accurate Exam Study Materials.Verified And Updated By Professionals.

4.3

4 reviews

5
1
4
3
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions