Deck 9: The Future of E-Discovery

ملء الشاشة (f)
exit full mode
سؤال
Which law proposed by the European Parliament would require explicit consent to being tracked on Web sites?

A) Cookie Law
B) Wiretap Act
C) FOIA
D) Fourth Amendment
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When exigent circumstances exist, a warrant is always needed to search property.
سؤال
Which of the following rules and regulations does the ArchiveSocial Web site NOT claim to follow?

A) FINRA
B) SEC
C) Cookie Law
D) Sarbanes-Oxley Act
سؤال
Under what circumstances may police search data on a cell phone taken from a man that is arrested?

A) in all circumstances
B) in no circumstances
C) when the phone is powered on
D) in exigent circumstances
سؤال
Privacy laws have kept pace with technology advancements quite closely.
سؤال
If a backpack is carried by a suspect who is arrested, police may inventory its contents?
سؤال
Which of the following is the capability to store a variety of communication types in the same inbox?

A) BYOA
B) event data recording
C) unified messaging
D) common message digest
سؤال
Accessing voicemail stored on the service provider's servers requires a subpoena or a warrant.
سؤال
Which concept is illustrated by the scenario in which a person's car is searched after it has been impounded for being illegally parked?

A) search incident to arrest
B) closed container
C) immediate control
D) inventory search
سؤال
The Fourth Amendment states that an expectation of privacy inside the home is considered reasonable.
سؤال
When the Recycle Bin is emptied in Windows, the files it contains can no longer be recovered.
سؤال
The proposed OCGPA amendment to the ECPA does which of the following?

A) restricts tracking citizens using GPS locators
B) enables law enforcement warrantless access to all electronic communications
C) requires organizations to notify people when personal information about them is collected
D) restricts eavesdropping on mobile devices
سؤال
Which of the following poses a security risk in the form of embedded malware?

A) unified messaging
B) DEFR
C) BYOA
D) GPS tracking
سؤال
ISO 27037:2012 was developed for which of the following purposes?

A) to address readiness for digital investigations
B) to describe how to respond to an investigation after the fact or in real time
C) to teach law enforcement about digital evidence tampering
D) to replace the FRCP in criminal cases
سؤال
Which of the following is authorized and trained to collect and transport digital evidence at an investigation scene as defined in ISO, 2012.

A) DEFR
B) BYOA
C) EDR
D) PIPEDA
سؤال
If you suspect computer discovery material has been deleted or altered, what should you try to acquire?

A) hard copies of files
B) hard drive image
C) copies of files on a removable disk
D) the file allocation table
سؤال
Which case illustrated a Fourth Amendment violation of "search incident to arrest?"

A) California v. Acevedo
B) Chimel v. California
C) Schlossberg v. Solesbee
D) United States v. Kolon Indus., Inc.
سؤال
Files that are stored in the cloud storage service called DropBox are never copied to the computer from which they are accessed.
سؤال
Which of the following is true about ECPA and SCA?

A) only stored e-mail is protected
B) they guarantee privacy for all electronic communication
C) they are ahead of technological advances
D) e-mail older than 180 days requires a subpoena
سؤال
Which controversial technology did the NHTSC propose legislation to make them mandatory for all new cars?

A) EDRs
B) DVRs
C) Cloud storage
D) GPS trackers
سؤال
Match between columns
Canada's privacy act
EDRs
Canada's privacy act
search incident to arrest
Canada's privacy act
OCGPA
Canada's privacy act
DEFR
Canada's privacy act
closed container
Canada's privacy act
anti-forensics
Canada's privacy act
Fourth Amendment
Canada's privacy act
BYOA
Canada's privacy act
unified messaging
Canada's privacy act
PIPEDA
سؤال
Match between columns
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
EDRs
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
search incident to arrest
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
OCGPA
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
DEFR
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
closed container
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
anti-forensics
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
Fourth Amendment
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
BYOA
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
unified messaging
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
PIPEDA
سؤال
Match between columns
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
EDRs
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
search incident to arrest
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
OCGPA
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
DEFR
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
closed container
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
anti-forensics
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
Fourth Amendment
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
BYOA
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
unified messaging
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
PIPEDA
سؤال
Match between columns
states that an expectation of privacy inside the home is considered reasonable
EDRs
states that an expectation of privacy inside the home is considered reasonable
search incident to arrest
states that an expectation of privacy inside the home is considered reasonable
OCGPA
states that an expectation of privacy inside the home is considered reasonable
DEFR
states that an expectation of privacy inside the home is considered reasonable
closed container
states that an expectation of privacy inside the home is considered reasonable
anti-forensics
states that an expectation of privacy inside the home is considered reasonable
Fourth Amendment
states that an expectation of privacy inside the home is considered reasonable
BYOA
states that an expectation of privacy inside the home is considered reasonable
unified messaging
states that an expectation of privacy inside the home is considered reasonable
PIPEDA
سؤال
Match between columns
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
EDRs
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
search incident to arrest
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
OCGPA
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
DEFR
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
closed container
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
anti-forensics
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
Fourth Amendment
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
BYOA
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
unified messaging
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
PIPEDA
سؤال
When a(n) __________ request is filed, government agencies must produce this information in a reasonable amount of time.
سؤال
Match between columns
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
EDRs
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
search incident to arrest
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
OCGPA
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
DEFR
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
closed container
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
anti-forensics
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
Fourth Amendment
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
BYOA
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
unified messaging
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
PIPEDA
سؤال
Match between columns
authorized and trained to collect and transport digital evidence at an investigation scene
EDRs
authorized and trained to collect and transport digital evidence at an investigation scene
search incident to arrest
authorized and trained to collect and transport digital evidence at an investigation scene
OCGPA
authorized and trained to collect and transport digital evidence at an investigation scene
DEFR
authorized and trained to collect and transport digital evidence at an investigation scene
closed container
authorized and trained to collect and transport digital evidence at an investigation scene
anti-forensics
authorized and trained to collect and transport digital evidence at an investigation scene
Fourth Amendment
authorized and trained to collect and transport digital evidence at an investigation scene
BYOA
authorized and trained to collect and transport digital evidence at an investigation scene
unified messaging
authorized and trained to collect and transport digital evidence at an investigation scene
PIPEDA
سؤال
An officer is allowed to search a(n) ____________ person and his or her immediate surroundings.
سؤال
At the end of 2012, a new _______ standard was created to help set more specific guidelines for digital evidence in an attempt to standardize practices worldwide.
سؤال
The ____________ Amendment of the United States constitution covers unreasonable search and seizure without probable cause.
سؤال
One new product is Recommind, which uses ____________ coding to sort through thousands of terabytes of data.
سؤال
Mobile devices that access a company's wireless network show up in the network server ________.
سؤال
Match between columns
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
EDRs
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
search incident to arrest
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
OCGPA
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
DEFR
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
closed container
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
anti-forensics
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
Fourth Amendment
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
BYOA
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
unified messaging
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
PIPEDA
سؤال
Match between columns
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
EDRs
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
search incident to arrest
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
OCGPA
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
DEFR
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
closed container
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
anti-forensics
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
Fourth Amendment
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
BYOA
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
unified messaging
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
PIPEDA
سؤال
With the advent of the Internet and related technology, _________ concerns extended to places such as e-mail and voicemail.
سؤال
Police can search a suspect's shoulder bag when that suspect is arrested due to the principal of ___________ searches.
سؤال
Another challenge that has plagued the digital forensics community has been qualifications for digital forensics ______________.
سؤال
The OCGPA severely restricts tracking citizens by using _________ locators in mobile devices.
سؤال
Match between columns
devices that record the use of airbags, brakes, safety belts, and so forth
EDRs
devices that record the use of airbags, brakes, safety belts, and so forth
search incident to arrest
devices that record the use of airbags, brakes, safety belts, and so forth
OCGPA
devices that record the use of airbags, brakes, safety belts, and so forth
DEFR
devices that record the use of airbags, brakes, safety belts, and so forth
closed container
devices that record the use of airbags, brakes, safety belts, and so forth
anti-forensics
devices that record the use of airbags, brakes, safety belts, and so forth
Fourth Amendment
devices that record the use of airbags, brakes, safety belts, and so forth
BYOA
devices that record the use of airbags, brakes, safety belts, and so forth
unified messaging
devices that record the use of airbags, brakes, safety belts, and so forth
PIPEDA
سؤال
What is the principle of "closed container" with respect to a computer? Give an example.
سؤال
What new bill was proposed as a result of the Petraeus scandal with respect to GPS tracking? Describe that bill.
سؤال
Describe how privacy can be an issue with cloud storage.
سؤال
Describe anti-forensics. What are some anti-forensics behaviors?
سؤال
What are some of the questions raised by technological advances such as the cloud?
سؤال
Describe United States v. Karo and how the Fourth Amendment came into play in that case.
سؤال
What are some of the data that might be found on mobile devices and where might the data be stored?
سؤال
What has been done to address the lack of standards for digital forensics investigators?
سؤال
How does ISO 27037:2012 help with the fact that law often lags behind technology?
سؤال
Describe the "search incident to arrest" principle and how it was applied in Chimel v. California.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: The Future of E-Discovery
1
Which law proposed by the European Parliament would require explicit consent to being tracked on Web sites?

A) Cookie Law
B) Wiretap Act
C) FOIA
D) Fourth Amendment
A
2
When exigent circumstances exist, a warrant is always needed to search property.
False
3
Which of the following rules and regulations does the ArchiveSocial Web site NOT claim to follow?

A) FINRA
B) SEC
C) Cookie Law
D) Sarbanes-Oxley Act
C
4
Under what circumstances may police search data on a cell phone taken from a man that is arrested?

A) in all circumstances
B) in no circumstances
C) when the phone is powered on
D) in exigent circumstances
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Privacy laws have kept pace with technology advancements quite closely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
If a backpack is carried by a suspect who is arrested, police may inventory its contents?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is the capability to store a variety of communication types in the same inbox?

A) BYOA
B) event data recording
C) unified messaging
D) common message digest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Accessing voicemail stored on the service provider's servers requires a subpoena or a warrant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which concept is illustrated by the scenario in which a person's car is searched after it has been impounded for being illegally parked?

A) search incident to arrest
B) closed container
C) immediate control
D) inventory search
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
The Fourth Amendment states that an expectation of privacy inside the home is considered reasonable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
When the Recycle Bin is emptied in Windows, the files it contains can no longer be recovered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The proposed OCGPA amendment to the ECPA does which of the following?

A) restricts tracking citizens using GPS locators
B) enables law enforcement warrantless access to all electronic communications
C) requires organizations to notify people when personal information about them is collected
D) restricts eavesdropping on mobile devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following poses a security risk in the form of embedded malware?

A) unified messaging
B) DEFR
C) BYOA
D) GPS tracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
ISO 27037:2012 was developed for which of the following purposes?

A) to address readiness for digital investigations
B) to describe how to respond to an investigation after the fact or in real time
C) to teach law enforcement about digital evidence tampering
D) to replace the FRCP in criminal cases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is authorized and trained to collect and transport digital evidence at an investigation scene as defined in ISO, 2012.

A) DEFR
B) BYOA
C) EDR
D) PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
If you suspect computer discovery material has been deleted or altered, what should you try to acquire?

A) hard copies of files
B) hard drive image
C) copies of files on a removable disk
D) the file allocation table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which case illustrated a Fourth Amendment violation of "search incident to arrest?"

A) California v. Acevedo
B) Chimel v. California
C) Schlossberg v. Solesbee
D) United States v. Kolon Indus., Inc.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Files that are stored in the cloud storage service called DropBox are never copied to the computer from which they are accessed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is true about ECPA and SCA?

A) only stored e-mail is protected
B) they guarantee privacy for all electronic communication
C) they are ahead of technological advances
D) e-mail older than 180 days requires a subpoena
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which controversial technology did the NHTSC propose legislation to make them mandatory for all new cars?

A) EDRs
B) DVRs
C) Cloud storage
D) GPS trackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
Canada's privacy act
EDRs
Canada's privacy act
search incident to arrest
Canada's privacy act
OCGPA
Canada's privacy act
DEFR
Canada's privacy act
closed container
Canada's privacy act
anti-forensics
Canada's privacy act
Fourth Amendment
Canada's privacy act
BYOA
Canada's privacy act
unified messaging
Canada's privacy act
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
EDRs
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
search incident to arrest
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
OCGPA
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
DEFR
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
closed container
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
anti-forensics
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
Fourth Amendment
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
BYOA
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
unified messaging
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match between columns
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
EDRs
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
search incident to arrest
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
OCGPA
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
DEFR
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
closed container
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
anti-forensics
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
Fourth Amendment
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
BYOA
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
unified messaging
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match between columns
states that an expectation of privacy inside the home is considered reasonable
EDRs
states that an expectation of privacy inside the home is considered reasonable
search incident to arrest
states that an expectation of privacy inside the home is considered reasonable
OCGPA
states that an expectation of privacy inside the home is considered reasonable
DEFR
states that an expectation of privacy inside the home is considered reasonable
closed container
states that an expectation of privacy inside the home is considered reasonable
anti-forensics
states that an expectation of privacy inside the home is considered reasonable
Fourth Amendment
states that an expectation of privacy inside the home is considered reasonable
BYOA
states that an expectation of privacy inside the home is considered reasonable
unified messaging
states that an expectation of privacy inside the home is considered reasonable
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match between columns
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
EDRs
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
search incident to arrest
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
OCGPA
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
DEFR
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
closed container
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
anti-forensics
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
Fourth Amendment
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
BYOA
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
unified messaging
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
When a(n) __________ request is filed, government agencies must produce this information in a reasonable amount of time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match between columns
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
EDRs
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
search incident to arrest
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
OCGPA
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
DEFR
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
closed container
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
anti-forensics
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
Fourth Amendment
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
BYOA
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
unified messaging
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match between columns
authorized and trained to collect and transport digital evidence at an investigation scene
EDRs
authorized and trained to collect and transport digital evidence at an investigation scene
search incident to arrest
authorized and trained to collect and transport digital evidence at an investigation scene
OCGPA
authorized and trained to collect and transport digital evidence at an investigation scene
DEFR
authorized and trained to collect and transport digital evidence at an investigation scene
closed container
authorized and trained to collect and transport digital evidence at an investigation scene
anti-forensics
authorized and trained to collect and transport digital evidence at an investigation scene
Fourth Amendment
authorized and trained to collect and transport digital evidence at an investigation scene
BYOA
authorized and trained to collect and transport digital evidence at an investigation scene
unified messaging
authorized and trained to collect and transport digital evidence at an investigation scene
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
An officer is allowed to search a(n) ____________ person and his or her immediate surroundings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
At the end of 2012, a new _______ standard was created to help set more specific guidelines for digital evidence in an attempt to standardize practices worldwide.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
The ____________ Amendment of the United States constitution covers unreasonable search and seizure without probable cause.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
One new product is Recommind, which uses ____________ coding to sort through thousands of terabytes of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Mobile devices that access a company's wireless network show up in the network server ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match between columns
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
EDRs
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
search incident to arrest
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
OCGPA
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
DEFR
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
closed container
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
anti-forensics
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
Fourth Amendment
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
BYOA
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
unified messaging
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match between columns
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
EDRs
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
search incident to arrest
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
OCGPA
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
DEFR
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
closed container
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
anti-forensics
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
Fourth Amendment
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
BYOA
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
unified messaging
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
With the advent of the Internet and related technology, _________ concerns extended to places such as e-mail and voicemail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Police can search a suspect's shoulder bag when that suspect is arrested due to the principal of ___________ searches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Another challenge that has plagued the digital forensics community has been qualifications for digital forensics ______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
The OCGPA severely restricts tracking citizens by using _________ locators in mobile devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match between columns
devices that record the use of airbags, brakes, safety belts, and so forth
EDRs
devices that record the use of airbags, brakes, safety belts, and so forth
search incident to arrest
devices that record the use of airbags, brakes, safety belts, and so forth
OCGPA
devices that record the use of airbags, brakes, safety belts, and so forth
DEFR
devices that record the use of airbags, brakes, safety belts, and so forth
closed container
devices that record the use of airbags, brakes, safety belts, and so forth
anti-forensics
devices that record the use of airbags, brakes, safety belts, and so forth
Fourth Amendment
devices that record the use of airbags, brakes, safety belts, and so forth
BYOA
devices that record the use of airbags, brakes, safety belts, and so forth
unified messaging
devices that record the use of airbags, brakes, safety belts, and so forth
PIPEDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is the principle of "closed container" with respect to a computer? Give an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What new bill was proposed as a result of the Petraeus scandal with respect to GPS tracking? Describe that bill.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe how privacy can be an issue with cloud storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Describe anti-forensics. What are some anti-forensics behaviors?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What are some of the questions raised by technological advances such as the cloud?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe United States v. Karo and how the Fourth Amendment came into play in that case.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What are some of the data that might be found on mobile devices and where might the data be stored?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What has been done to address the lack of standards for digital forensics investigators?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
How does ISO 27037:2012 help with the fact that law often lags behind technology?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe the "search incident to arrest" principle and how it was applied in Chimel v. California.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.