CJUS 363 Quiz 1

CJUS 363 Quiz 1 Liberty University

  1. How often should hardware be replaced within a forensics lab?
  2. Which amendment to the U.S. Constitution protects everyone’s right to be secure in their person, residence, and property from search and seizure?
  3. When conducting a digital forensics analysis under _______________ rules for an attorney, you must keep all findings confidential.
  4. is a specialized viewer software program.
  5. is not one of the functions of the investigations triad.
  6. In what year was the Computer Fraud and Abuse Act passed?
  7. Typically, the _____________ requires a bootable DVD or USB flash drive that runs an independent OS in a suspect computer’s RAM, with the goal of preserving data during an acquisition.
  8. A forensics lab should maintain a paper or electronic sign­in log for all visitors. What information should be in this log?
  9. Which option below is not a recommendation for securing storage containers?
  10. Why is confidentiality critical in a corporate environment during and after an investigation of a terminated employee?
  11. When creating a new forensics lab, what are some questions that should be considered when calculating the budget required? List at least three questions.
  12. A(n) _______________ acts as an evidence locker or safe to preserve the integrity of evidence.
  13. How should backups be stored and maintained?
  14. Which ISO standard below is followed by the ASCLD?
  15. must be included in an affidavit to support an allegation in order to justify a warrant.
  16. What is the difference between an interview and an interrogation?
  17. What is a bit­stream image?
  18. can be used to restore backup files directly to a workstation.
  19. are generated at the federal, state, and local levels to show the types and frequency of crimes committed.
  20. is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence.
  21. The _______ is not one of the three stages of a typical criminal case.
  22. If a police officer or investigator has sufficient cause to support a search warrant, the prosecuting attorney might direct him or her to submit a(n)
  23. is not recommended for a digital forensics workstation.
  24. After the evidence has been presented in a trial by jury, the jury must deliver a(n)
  25. After a judge approves and signs a search warrant, the _______ is responsible for the collection of evidence as defined by the warrant.
Buy Answer Key
  • Find by class