In Facebook the ____ info simply tells you the last time a person logged on.
a. extended subscriber
b. advanced subscriber
c. Neoprint
d. basic subscriber Correct Answer: c. Neoprint
In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
a. litigation
b. allegation
c. blotter
d. prosecution Correct Answer: d. prosecution
Most digital investigations in the private sector involve.
a. e-mail abuse
b. misuse of digital assets
c. Internet abuse
d. VPN abuse Correct Answer: b. misuse of digital assets
The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.
a. Federal Rules of Evidence (FRE)
b. Department of Defense Computer Forensics Laboratory (DCFL)
c. DIBS
d. Computer Analysis and Response Team (CART) Correct Answer: d. Computer Analysis and Response
Team (CART)
Without a warning banner, employees might have an assumed ____ when using a company's computer
systems and network accesses.
a. line of authority
b. right of privacy
c. line of privacy
d. line of right Correct Answer: b. right of privacy
____ involves recovering information from a computer that was deleted by mistake or lost during a
power surge or server crash, for example.
a. Data recovery
b. Network forensics
c. Computer forensics
d. Disaster recovery Correct Answer: a. Data recovery
, A ____ plan specifies how to rebuild a forensic workstation after it has been severely contaminated by a
virus from a drive you're analyzing.
a. disaster recovery
b. risk management
c. configuration management
d. security Correct Answer: a. disaster recovery
In the ____, you justify acquiring newer and better resources to investigate digital forensics cases.
a. risk evaluation
b. business case
c. configuration plan
d. upgrade policy Correct Answer: b. business case
To preserve the integrity of evidence, your lab should function as an evidence locker or safe, making it a
____ or a secure storage safe.
a. secure workstation
b. secure workbench
c. protected PC
d. secure facility Correct Answer: d. secure facility
____ are generated at the federal, state, and local levels to show the types and frequency of crimes
committed.
a. HTCN reports
b. IDE reports
c. Uniform crime reports
d. ASCLD reports Correct Answer: c. Uniform crime reports
____ involves determining how much risk is acceptable for any process or operation, such as replacing
equipment.
a. Risk configuration
b. Change management
c. Configuration management
d. Risk management Correct Answer: d. Risk management
Autopsy uses ____ to validate an image.
a. RC4
b. MD5
c. AFF
d. AFD Correct Answer: b. MD5
If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is
available.