and Answers
With a computing investigation, the ability to perform a series of steps again and again to
produce the same results is known as - ANS Repeatable findings
In what year was the Computer Fraud and Abuse Act passed? - ANS 1986
The sale of sensitive or confidential company information to a competitor is known as -
ANS Industrial espionage
After a judge approves and signs a search warrant, the______ is responsible for the collection
of evidence as defined by the warrant - ANS Digital Evidence First Responder
_______Is not recommended for a digital forensic workstation - ANS Remote access
software
Which Amendment to the U.S constitution protects everyone's rights to be secure in their
person, residence, and property from search and seizure? - ANS Fourth Amendment
A chain of evidence form, which is used to document what has not been done with the original
evidence and forensic copies of the evidence, is also known as - ANS Evidence custody form
An evidence custody form does not usually contain _______. - ANS a witness list
Pg. 1 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.
, Most digital investigations in the private sector involve misuse of computing assets -
ANS True
What tool, currently maintained by the IRS Criminal Investigation Division and limited to use by
law enforcement, can analyze and read special files that are copies of a disk? - ANS ILook
In order to qualify for the Advanced Certified Computer Forensic Technician certification, a
candidate must have _______ years of hands-on experience in computer forensics
investigations. - ANS five
How many words should be in the abstract of a report? - ANS 150 to 200 words
How often should hardware be replaced within a forensics lab? - ANS Every 12 to 18 months
A TEMPEST facility is designed to accomplish which of the following goals? - ANS Shield
sensitive computing systems and prevent electronic eavesdropping of computer emissions.
Which option below is not a recommendation for securing storage containers? - ANS Rooms
with evidence containers should have a secured wireless network.
An ___________________ is a document that serves as a guideline for knowing what questions
to expect when you're testifying. - ANS testimony procedure
As with any research paper, write the ___________________ last. - ANS abstract
A disaster recovery plan ensures that workstations and file servers can be restored to their
original condition in the event of a catastrophe. - ANS True
Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.