CIS 562 Week 5 Midterm Exam – Strayer NEW



Click On The Link Below To Purchase A+ Graded Material
Instant Download


Chapters 1 Through 6

Chapter 1: Computer Forensics and Investigations as a Profession

TRUE/FALSE

     1.   By the 1970s, electronic crimes were increasing, especially in the financial sector.


     2.   To be a successful computer forensics investigator, you must be familiar with more than one computing platform.


     3.   Computer investigations and forensics fall into the same category: public investigations.


     4.   The law of search and seizure protects the rights of all people, excluding people suspected of crimes.


     5.   After a judge approves and signs a search warrant, it’s ready to be executed, meaning you can collect evidence as defined by the warrant.


MULTIPLE CHOICE

     1.   The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.
a.
Federal Rules of Evidence (FRE)
b.
Department of Defense Computer Forensics Laboratory (DCFL)
c.
DIBS
d.
Computer Analysis and Response Team (CART)



     2.   ____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.
a.
Data recovery
c.
Computer forensics
b.
Network forensics
d.
Disaster recovery



     3.   ____ involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring.
a.
Computer forensics
c.
Disaster recovery
b.
Data recovery
d.
Network forensics



     4.   The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.
a.
network intrusion detection
c.
incident response
b.
computer investigations
d.
litigation



     5.   By the early 1990s, the ____ introduced training on software for forensics investigations.
a.
IACIS
c.
CERT
b.
FLETC
d.
DDBIA



     6.   In the Pacific Northwest, ____ meets monthly to discuss problems that law enforcement and corporations face.
a.
IACIS
c.
FTK
b.
CTIN
d.
FLETC



     7.   In a ____ case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.
a.
corporate
c.
criminal
b.
civil
d.
fourth amendment



     8.   In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
a.
litigation
c.
blotter
b.
allegation
d.
prosecution



     9.   Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed.
a.
litigation
c.
blotter
b.
allegation
d.
prosecution



   10.   In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.
a.
blotter
c.
litigation report
b.
exhibit report
d.
affidavit



   11.   It’s the investigator’s responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.
a.
litigation
c.
exhibits
b.
prosecution
d.
reports



   12.   The affidavit must be ____ under sworn oath to verify that the information in the affidavit is true.
a.
notarized
c.
recorded
b.
examined
d.
challenged



   13.   Published company policies provide a(n) ____ for a business to conduct internal investigations.
a.
litigation path
c.
line of allegation
b.
allegation resource
d.
line of authority



   14.   A ____ usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will.
a.
warning banner
c.
line of authority
b.
right of privacy
d.
right banner



   15.   A(n) ____ is a person using a computer to perform routine tasks other than systems administration.
a.
complainant
c.
end user
b.
user banner
d.
investigator



   16.   Without a warning banner, employees might have an assumed ____ when using a company’s computer systems and network accesses.
a.
line of authority
c.
line of privacy
b.
right of privacy
d.
line of right



   17.   In addition to warning banners that state a company’s rights of computer ownership, businesses should specify a(n) ____ who has the power to conduct investigations.
a.
authorized requester
c.
line of right
b.
authority of line
d.
authority of right



   18.   Most computer investigations in the private sector involve ____.
a.
e-mail abuse
c.
Internet abuse
b.
misuse of computing assets
d.
VPN abuse



   19.   Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.
a.
silver-tree
c.
silver-platter
b.
gold-tree
d.
gold-platter



   20.   Your ____ as a computer investigation and forensics analyst is critical because it determines your credibility.
a.
professional policy
c.
line of authority
b.
oath
d.
professional conduct



   21.   Maintaining ____ means you must form and sustain unbiased opinions of your cases.
a.
confidentiality
c.
integrity
b.
objectivity
d.
credibility



COMPLETION

     1.   ____________________ involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases.


     2.   The ____________________ to the U.S. Constitution (and each state’s constitution) protects everyone’s rights to be secure in their person, residence, and property from search and seizure.


     3.   The term ____________________ refers to large corporate computing systems that might include disparate or formerly independent systems.


     4.   When you work in the ____________________ group, you test and verify the integrity of standalone workstations and network servers.


     5.   The ____________________ provides a record of clues to crimes that have been committed previously.


MATCHING

Match each item with a statement below:

a.
Computer forensics
f.
HTCIA
b.
Network forensics
g.
Affidavit

Comments

Popular posts from this blog

MKT 515 Week 5 Midterm Exam – Strayer NEW

MKT 505 Exam Midterm and Final Exam – Strayer New

PAD 500 Week 5 Assignment 2 – Strayer