вторник, 17 марта 2015 г.

SEC 572 Midterm

Download here:
http://www.onlinehomework.education/product/sec-572-midterm/

(TCO 2) The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime
(TCO 1) It’s the investigator’s responsibility to write the affidavit, which must include _____ (evidence) that support the allegation to justify the warrant
(TCO 2) Most computer investigations in the private sector involve _____.
(TCO 1) _____ can be the most time-consuming task, even when you know exactly what to look for in the evidence
(TCO 2) A _____ is a bit-by-bit copy of the original storage medium
(TCO 1) When you write your final report, state what you did and what you _____.
(TCO 3) To preserve the integrity of evidence data, your lab should function as an evidence locker or safe, making it a _____ or a secure storage safe
(TCO 3) To preserve the integrity of evidence data, we verify the integrity of lossless compressed data by creating a _______ of the data before and after compression
(TCO 1) _____ involves determining how much risk is acceptable for any process or operation, such as replacing equipment
(TCO 4) The most common and flexible data-acquisition method is _____.
_____ is facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed
(TCO 5) Computer forensics examiners have two roles: scientific/technical witness and _____ witness
(TCO 5) Attorneys search _____ for information on expert witnesses
(TCO 4) ____ was introduced when Microsoft created Windows NT and is the primary file system for Windows Vista
(TCO 4) A ____ is a column of tracks on two or more disk platters
(TCO 4) ____ is the file structure database that Microsoft originally designed for floppy disks
(TCO 4) The purpose of the ____ is to provide a mechanism for recovering encrypted files under EFS if there’s a problem with the user’s original private key
(TCO 4) Explain why Standard Operating Procedures are important when conducting a digital investigation and include some of the procedures that you think should be included in an SOP
(TCO 2) Explain the types of digital crimes committed utilizing e-mail and explain some of the processes the digital forensics specialist could use to obtain the evidence to prosecute these crimes
(TCO 1) What are the stages that a criminal case follows? Contrast this to the stages of a civil case
(TCO 1) What are some of the most common types of corporate computer crime?
(TCO 2) What text can be used in internal warning banners
(TCO 2) What are the duties of a lab manager?
(TCO 2) Discuss the use of a laptop PC as a forensic workstation
(TCO 3) Explain the use of hash algorithms to verify the integrity of lossless compressed data
(TCO 3) What are the requirements for acquiring data on a suspect computer using Linux?

0 коммент.:

Отправить комментарий

 
;