Answers – 100% Solved
_______ often work as part of a team to secure an organization's computers and networks. -
✔✔✔-Forensics Investigator
_________ involves recovering information from a computer that was deleted by mistake or lost
during a power surge or server crash, for example. - ✔✔✔-Data Recovery
A ______________ usually appears when a computer starts or connects to the company
intranet, network, or virtual private network (VPN) and informs end users that the organization
reserves the right to inspect computer systems and network traffic at will. - ✔✔✔-Warning
banner
A(n) _______________ is a person using a computer to perform routine tasks other than
systems administration. - ✔✔✔-end user
After a judge approves and signs a search warrant, it's ready to be executed, meaning you can
collect evidence as defined by the warrant. (T/F) - ✔✔✔-True
Allows legal counsel to use previous cases similar to the current one because the laws don't yet
exist. - ✔✔✔-Case Law
Based on the incident or crime, the complainant makes a(n) ____________, an accusation or
supposition of fact that a crime has been committed. - ✔✔✔-allegation
Briefly describe hostile work environment? - ✔✔✔-Unwelcome or offensive behavior in the
workplace, which causes one or more employees to feel uncomfortable, scared, or intimidated
in their place of employment.
examples:
, 1-Guide to Computer Forensics and Investigations Exam with Questions and
Answers – 100% Solved
excessive use of a company's e-mail system for personal use to making threats or harassing
others via e-mail.
Briefly describe the main characteristics of private-sector investigations. - ✔✔✔-Private or
corporate investigations deal with private companies, non-law enforcement gov't agencies, and
lawyers. These private organizations aren't governed directly by criminal law or Fourth
Amendment issues, but by internal policies that define expected employee behavior and
conduct in the workplace. Private corporate investigations also involve litigation disputes.
Although private investigations are usually conducted in civil cases, a civil case can escalate into
a criminal case, and a criminal case can be reduced to a civil case. If you follow good forensics
procedures, the evidence found in your investigations can easily make the transition between
civil and criminal cases.
Briefly describe the main characteristics of public-sector investigations. - ✔✔✔-Public
investigations involve government agencies responsible for criminal investigations and
prosecution. Gov't agencies range from local, county, and state or provincial police departments
to federal regulatory enforcement agencies. These organizations must observe legal guidelines
such as Article 8 in the Charter of Rights of Canada, the Criminal Procedures Act of the Republic
of Namibia, and U.S. Fourth Amendment issues related to search and seizure rules.
Briefly describe the triad that makes up computer security. - ✔✔✔-The computer investigations
function is one of three in a triad that makes up computing security. In an enterprise the triad
consists of the following parts:
Vulnerability assessment and risk management
Network Intrusion detection and incident response
Computer investigations