100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank for Guide to Computer Forensics and Investigations, 7th Edition by Bill Nelson

Rating
-
Sold
1
Pages
227
Grade
A+
Uploaded on
31-08-2024
Written in
2024/2025

Test Bank for Guide to Computer Forensics and Investigations, 7e 7th Edition by Bill Nelson, Amelia Phillips, Christopher Steuart. Complete Modules are included with answers (Module 1 to 15) 1. Understanding the Digital Forensics Profession and Investigations. 2. Report Writing and Testimony for Digital Investigations. 3. The Investigator’s Laboratory and Digital Forensics Tools. 4. Data Acquisition. 5. Processing Crime and Incident Scenes. 6. Working with Microsoft file systems and Windows Registry. 7. Linux and Macintosh File Systems. 8. Recovering Graphics Files and Forensics Analysis. 9. Live and Virtual Machine Acquisitions. 10. Network Forensics. 11. Internet of Anything Forensics and Drone Forensics. 12. Mobile Device Forensics. 13. E-mail and Social Media Investigations. 14. Cloud Forensics. 15. e-Discovery.

Show more Read less
Institution
Computer Concepts
Course
Computer Concepts











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Concepts
Course
Computer Concepts

Document information

Uploaded on
August 31, 2024
Number of pages
227
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Name: Class: Date:

Mod 01: Understanding the Digital Forensics Profession and Investigations

1. Mahmood is examining a device for digital evidence. There are two types of evidence he is looking for.
Which type of evidence will prove that his client is not guilty?
a. Inculpatory evidence
b. Exculpatory evidence
c. Miaculpatory evidence
d. Discretionary evidence
ANSWER: b
RATIONALE: Mahmood is looking for exculpatory evidence which is evidence that tends to show
that a defendant is not guilty of the crime they have been charged with. This type of
evidence can help to exonerate or clear the defendant of the charges. Exculpatory
evidence can include physical evidence, witness statements, or other types of
evidence that support the defendant's innocence.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.1 - Describe the field of digital forensics
TOPICS: An Overview of Digital Forensics
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

2. What are the main differences between public-sector investigations and private-sector investigations?

a. Private-sector investigations involve government agencies responsible for criminal investigations and
prosecution. Public-sector investigations focus more on policy violations.
b. Private-sector investigations can become criminal investigations and public-sector investigations can
become civil investigation depending upon the circumstances.
c. Public-sector investigations involve government agencies responsible for criminal investigations and
prosecution. Private-sector investigations focus more on policy violations.
d. The private sector can ignore criminal investigations, and the public sector can ignore civil
investigations.
ANSWER: b, c
RATIONALE: In general, the main difference between public-sector and private sector
investigations is that the public-sector investigations involve government agencies
responsible for criminal investigations and prosecution. Government agencies range
from municipal, county, and state or provincial police departments to federal law
enforcement agencies. These organizations must observe legal guidelines of their
jurisdictions. Private-sector investigations focus more on policy violations. However,
criminal acts, such as corporate espionage, can also occur. So, although private-sector
investigations often start as civil cases, they can develop into criminal cases;
likewise, a criminal case can have implications leading to a civil case.
POINTS: 1
QUESTION TYPE: Multiple Response
Page 1

,Name: Class: Date:

Mod 01: Understanding the Digital Forensics Profession and Investigations

HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

3. When conducting a computer investigation for potential criminal violations of the law, the legal processes
you follow depend on local customs, legislative standards, and rules of evidence. In general, however, a
criminal case follows three stages. What are those three stages?
a. Complaint, the investigation, and the prosecution
b. Complaint, discovery, and the trial
c. Complaint, service of process, and motions
d. Complaint, answer, discovery, and trial
ANSWER: a
RATIONALE: If it has been determined that a crime has been committed, it is sent to the prosecutor
to prosecute the case. Hence, there is a complaint, an investigation, and then the
prosecution.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

4. You're the head of the executive management committee and as part of your corporate governance duties you
must implement a policy to define and limit who has authorization to request a computer investigation and
forensics analysis (authorized requestor). Which group or groups should have the authority to request a
computer investigation?
a. The human resources department
b. The corporate ethics office
c. The general counsel or legal department
d. The accounting department
ANSWER: b, c
RATIONALE: The reason the corporate ethics office and general counsel's office should only be
involved in authorizing investigations is that other groups within the organization
might create false allegations of misconduct to prevent competing departments from
delivering a proposal for the same source of funds.
Page 2

,Name: Class: Date:

Mod 01: Understanding the Digital Forensics Profession and Investigations

POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Apply
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

5. Allen works for a small newspaper. There is no corporate security investigations group, no written or verbal
acceptable use policy, and the publisher (owner) owns the rights to all the computer hardware and software.
One day, the publisher calls him into the office and asks him to help them with an email problem. Upon fixing
the problem Allen discovers that there are illicit photos (no one was underage) on the publisher's laptop. The
publisher later asks Allen to sanitize the laptop because the publisher wants to give it to their grandson. Allen
must go through the laptop to find all the photos. What can Allen do to stop this work behavior?
a. Report the publisher to Human Resources
b. File a hostile work environment claim
c. Sanitize the laptop and do nothing else
d. Refuse to do the job
ANSWER: b
RATIONALE: In this situation, no laws are broken. There is no written or verbal acceptable use
policy so there is no legal recourse for the publisher's actions other than Allen filing a
claim citing a hostile work environment.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Apply
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

6. As head of Zenon's corporate IT department, Naya is tasked with analyzing the corporate mobile device
policy. She needs to decide which is better, company owned mobile devices or BYOD? As a member of the
corporate security team, Naya asks you for advice on which you think will be more appropriate. When you
examine all options, which environment do you think works best for Zenon?
a. With company owned devices, it falls on the employee to keep them updated.
b. With company owned devices, all apps, files, and email can be secured.
c. With BYOD employees own the devices so companies are not liable if anything happens to the
device.
Page 3

, Name: Class: Date:

Mod 01: Understanding the Digital Forensics Profession and Investigations

d. With BYOD, the employee buys the device, and the company can lock it down (mobile device
management).
ANSWER: b, d
RATIONALE: The issues relating to BYOD versus company owned devices have been argued
amongst corporate IT managers for years. On the one hand, having a BYOD policy
frees companies from having to purchase smart phones for employees and saves them
money. But on the other hand, having a corporate owned device means a more
secure environment. It is a matter of corporate policy that determines what the smart
phone policy is.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Analyze/Create/Evaluate
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

7. Thanks to the dark web, anybody can access computer programs that will help users exfiltrate (remove) data
from any type of computer or network. Because of this activity, white-collar crime and industrial espionage are
on the rise. How does white-collar-crime compare to industrial espionage?
a. White-collar crime refers to financial crimes committed in a business or professional setting, while
espionage refers to the unauthorized sharing of confidential information to a competitor or foreign
entity.
b. Espionage refers to financial crimes committed in a business or professional setting, while white
collar crime refers to the unauthorized sharing of confidential information to a competitor or foreign
entity.
c. White-collar crime is the same as espionage and are both punishable offenses.
d. White-collar crime and espionage are victimless crimes.
ANSWER: a
RATIONALE: The cost of white-collar crime and espionage to companies can vary greatly and is
difficult to quantify with precision. However, the fiscal impact can be substantial and
goes far beyond financial losses. However, in general white-collar crime refers to
financial crimes committed in a business or professional setting, while espionage
refers to the unauthorized sharing of confidential information to a competitor or
foreign entity.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
Page 4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Tutor247 Boston University
View profile
Follow You need to be logged in order to follow users or courses
Sold
6085
Member since
3 year
Number of followers
3560
Documents
1122
Last sold
1 hour ago
Tutor 24/7

Providing best and accurate study guidance to students since 2011. Swift response to our students 24/7 and Seven days a week. At your service :)

4.1

750 reviews

5
451
4
125
3
72
2
30
1
72

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions