CJUS 363 Quiz 1

CJUS 363 Quiz 1 Liberty University

Set 1

  1. When conducting a digital forensics analysis under _______________ rules for an attorney, you must keep all findings confidential.​
  2. _______ is not one of the functions of the investigations triad.
  3. ​How should backups be stored and maintained?
  4. ​Why is confidentiality critical in a corporate environment during and after an investigation of a terminated employee?
  5. Typically, the _____________ requires a bootable DVD or USB flash drive that runs an independent OS in a suspect computer’s RAM, with the goal of preserving data during an acquisition.
  6. ​When creating a new forensics lab, what are some questions that should be considered when calculating the budget required? List at least three questions.
  7. _______ is a specialized viewer software program.
  8. ​The _______ is not one of the three stages of a typical criminal case.
  9. Which amendment to the U.S. Constitution protects everyone’s right to be secure in their person, residence, and property from search and seizure?​
  10. _______ can be used to restore backup files directly to a workstation.
  11. _______________ are generated at the federal, state, and local levels to show the types and frequency of crimes committed.
  12. _______ is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence.​
  13. A forensics lab should maintain a paper or electronic sign-in log for all visitors. What information should be in this log?​
  14. A disaster recovery plan ensures that workstations and file servers can be restored to their original condition in the event of a catastrophe.
  15. _______ must be included in an affidavit to support an allegation in order to justify a warrant.
  16. ​How often should hardware be replaced within a forensics lab?
  17. ​Which option below is not a recommendation for securing storage containers?
  18. What is the difference between an interview and an interrogation?​
  19. What can be done to help prevent the buildup of static electricity?​
  20. ​After a judge approves and signs a search warrant, the _______ is responsible for the collection of evidence as defined by the warrant.
  21. A(n) _______________ acts as an evidence locker or safe to preserve the integrity of evidence.
  22. What is a bit-stream image?​
  23. ​After the evidence has been presented in a trial by jury, the jury must deliver a(n) _______.
  24. In what year was the Computer Fraud and Abuse Act passed?​
  25. If a police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit a(n) _______.​

Set 2

  1. How often should hardware be replaced within a forensics lab?
  2. Which amendment to the U.S. Constitution protects everyone’s right to be secure in their person, residence, and property from search and seizure?
  3. When conducting a digital forensics analysis under _______________ rules for an attorney, you must keep all findings confidential.
  4. is a specialized viewer software program.
  5. is not one of the functions of the investigations triad.
  6. In what year was the Computer Fraud and Abuse Act passed?
  7. Typically, the _____________ requires a bootable DVD or USB flash drive that runs an independent OS in a suspect computer’s RAM, with the goal of preserving data during an acquisition.
  8. A forensics lab should maintain a paper or electronic sign­in log for all visitors. What information should be in this log?
  9. Which option below is not a recommendation for securing storage containers?
  10. Why is confidentiality critical in a corporate environment during and after an investigation of a terminated employee?
  11. When creating a new forensics lab, what are some questions that should be considered when calculating the budget required? List at least three questions.
  12. A(n) _______________ acts as an evidence locker or safe to preserve the integrity of evidence.
  13. How should backups be stored and maintained?
  14. Which ISO standard below is followed by the ASCLD?
  15. must be included in an affidavit to support an allegation in order to justify a warrant.
  16. What is the difference between an interview and an interrogation?
  17. What is a bit­stream image?
  18. can be used to restore backup files directly to a workstation.
  19. are generated at the federal, state, and local levels to show the types and frequency of crimes committed.
  20. is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence.
  21. The _______ is not one of the three stages of a typical criminal case.
  22. If a police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit a(n)
  23. is not recommended for a digital forensics workstation.
  24. After the evidence has been presented in a trial by jury, the jury must deliver a(n)
  25. After a judge approves and signs a search warrant, the _______ is responsible for the collection of evidence as defined by the warrant.
$2.99
Buy Answer Key