You are on page 1of 3

1. List two organizations mentioned in the chapter that provided computer forensic training.

CTIN: Computer Technology Investigators Network and


HTCIA: High Technology Crime Investigation Association

2. Computer forensic and data recovery refer to the same activity. True or False?

False

3. Police in the United States must use procedures that adhere to which of the following?

a. Third Amendment

b. Fourth Amendment

c. First Amendment

d. None of the above

b. Fourth Amendment

4. The triad of computer security includes which of the following?

a. Detection, response, and monitoring

b. Vulnerability assessment, detection, and monitoring

c. Vulnerability assessment, intrusion response, and investigation

d. Vulnerability assessment, intrusion response, and monitoring

c. Vulnerability assessment, intrusion response, and investigation

5. List three common types of digital crime.

E-mail harassment, cyberstalking, and embezzlement.

6. A corporate investigator must follow Fourth Amendment standards when conducting an investigation.
True or False?

False

7. What is the purpose of maintaining a network of forensic specialists?

To allow you the ability to cultivate professional relationships with people who specialize in technical
area different from your own specialty.

8. Policies can address rules for which of the following?

a. When you can log on to a company network from home


b. The Internet sites you can or cannot access

c. The amount of personal e-mail you can send

d. Any of the above

d. Any of the above

9. List two items that should appear on an internal warring banner.

An organization has the right to monitor what end users do, and their e-mail is not personal and can
be monitored.

10. Warning banners are often easier to present in court than policy manuals are. True or False?

True

11. Under normal circumstances a corporate investigator is considered an agent of law enforcement. True or
False?

False

12 List two types of computer investigations typically conducted in the corporate environment.

Espionage, and e-mail harassment

13. What is professional conduct and why is it important?

Professional conduct includes ethics, morals, and standards of behavior. It can affect your credibility.

14. What is the purpose of maintaining a professional journal?

It helps you remember what procedures were followed if the case ever goes to court. It can also be a
used as a reference if you need to remember how you solved a previous problem.

15. Laws and procedures for PDAs are which of the following?

a. Well established

b. Still being established

c. On the law books

d. None of the above

16. Why should companies appoint authorized requester for computer investigations?

To reduce conflicts from competing interests among organizations or departments and to avoid
starting investigations based on organizational/ departmental gains or jealousy.
17. What is the purpose of an affidavit?

To provide a sworn statement of support of facts about evidence of a crime this is submitted to a judge
with the request for a search warrant before seizing evidence.

18. What are the necessary components of a search warrant?

The affidavit is a sworn statement of support of facts about or evidence of a crime which is submitted
to a judge with the request for a search warrant before seizing evidence. This includes exhibits
(evidence) that support the allegation to justify the warrant. The affidavit is then notarized under
sworn oath to verify that the information in the affidavit is true. The affidavit, the warrant, and return
of service are basically the order of the procedure.

You might also like