Deck 5: Processing Crime and Incident Scenes

ملء الشاشة (f)
exit full mode
سؤال
Environmental and ____ issues are your primary concerns when you're working at the scene to gather information about an incident or a crime.

A) legal
B) safety
C) corporate
D) physical
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Every business or organization must have a well defined process that describes when an investigation can be initiated. At a minimum, most corporate policies require that employers have a ____ that a law or policy is being violated.

A) confirmed suspicion
B) proof
C) court order stating
D) reasonable suspicion
سؤال
When recovering evidence from a contaminated crime scene, if the temperature in the contaminated room is higher than ____ degrees, you should take measures to prevent a hard disk from overheating to prevent damage.

A) 80
B) 90
C) 95
D) 105
سؤال
A(n) ____ should include all the tools you can afford to take to the field.

A) initial-response field kit
B) extensive-response field kit
C) forensic lab
D) forensic workstation
سؤال
Investigating and controlling computer incident scenes in the corporate environment is ____ in the criminal environment.

A) much easier than
B) as easy as
C) as difficult as
D) more difficult than
سؤال
ISPs can investigate computer abuse committed by their customers.
سؤال
With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.

A) bit-stream copy utility
B) extensive-response field kit
C) initial-response field kit
D) seizing order
سؤال
Courts consider evidence data in a computer as ____ evidence.

A) physical
B) invalid
C) virtual
D) logical
سؤال
The reason for the standard practice of securing an incident or crime scene is to expand the area of control beyond the scene's immediate location.
سؤال
Confidential business data included with the criminal evidence are referred to as ____ data.

A) commingled
B) exposed
C) public
D) revealed
سؤال
Evidence is commonly lost or corrupted through ____, which involves police officers and other professionals who aren't part of the crime scene processing team.

A) onlookers
B) HAZMAT teams
C) FOIA laws
D) professional curiosity
سؤال
Corporate investigators always have the authority to seize all computers equipments during a corporate investigation.
سؤال
The FOIA was originally enacted in the ____.

A) 1940s
B) 1950s
C) 1960s
D) 1970s
سؤال
Most federal courts have interpreted computer records as ____ evidence.

A) conclusive
B) regular
C) hearsay
D) direct
سؤال
Law enforcement investigators need a(n) ____ to remove computers from a crime scene and transport them to a lab.

A) evidence custody form
B) FOIA form
C) affidavit
D) warrant
سؤال
____ is facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed.

A) Reasonable cause
B) Probable cause
C) A subpoena
D) A warrant
سؤال
Generally, computer records are considered admissible if they qualify as a ____ record.

A) hearsay
B) business
C) computer-generated
D) computer-stored
سؤال
____ records are data the system maintains, such as system log files and proxy server logs.

A) Computer-generated
B) Business
C) Computer-stored
D) Hearsay
سؤال
A judge can exclude evidence obtained from a poorly worded warrant.
سؤال
If a corporate investigator follows police instructions to gather additional evidence without a search warrant after you have reported the crime, you run the risk of becoming an agent of law enforcement.
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
agencies must comply with these laws and make documents they find and create available as public records
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
fingerprints can be tested with these systems
سؤال
The most common computer-related crime is ____.

A) homicide
B) check fraud
C) car stealing
D) sniffing
سؤال
Some computer cases involve dangerous settings. For these types of investigations, you must rely on the skills of _________________________ teams to recover evidence from the scene.
سؤال
Real-time surveillance requires ____ data transmissions between a suspect's computer and a network server.

A) poisoning
B) sniffing
C) blocking
D) preventing
سؤال
Certain files, such as the ____ and Security log in Windows XP, might lose essential network activity records if the power is terminated without a proper shutdown.

A) Password log
B) Word log
C) Io.sys
D) Event log
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
you should rely on this when dealing with a terrorist attack
سؤال
When an investigator finds a mix of information, judges often issue a(n) _________________________ to the warrant, which allows the police to separate innocent information from evidence.
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
covert surveillance product
سؤال
One technique for extracting evidence from large systems is called ____.

A) RAID copy
B) RAID imaging
C) large evidence file recovery
D) sparse acquisition
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
sets standards for recovering, preserving, and examining digital evidence
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
secondhand or indirect evidence, such as an overheard conversation
سؤال
During an investigation involving a live computer, do not cut electrical power to the running system unless it's an older ____ or MS-DOS system.

A) Windows XP
B) Windows 9x
C) Windows NT
D) Windows Me
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
what most cases in the corporate environment are considered
سؤال
_____________________ can be any information stored or transmitted in digital form.
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
a data-collecting tool
سؤال
If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have a(n) _________________________.
سؤال
When seizing computer evidence in criminal investigations, follow the ____ standards for seizing digital data.

A) Homeland Security Department
B) Patriot Act
C) U.S. DoJ
D) U.S. DoD
سؤال
Private-sector organizations include businesses and _________________________ that aren't involved in law enforcement.
سؤال
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
information unrelated to a computing investigation case
سؤال
Give some guidelines on how to video record a computer incident or crime scene.
سؤال
Illustrate with an example the problems caused by commingled data.
سؤال
How can you secure a computer incident or crime scene?
سؤال
Briefly describe the process of obtaining a search warrant.
سؤال
What is the plain view doctrine?
سؤال
Describe how to use a journal when processing a major incident or crime scene.
سؤال
Why should companies publish a policy stating their right to inspect computing assets at will?
سؤال
Describe the process of preparing an investigation team.
سؤال
What should you do when working on an Internet investigation and the suspect's computer is on?
سؤال
How can you determine who is in charge of an investigation?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Processing Crime and Incident Scenes
1
Environmental and ____ issues are your primary concerns when you're working at the scene to gather information about an incident or a crime.

A) legal
B) safety
C) corporate
D) physical
B
2
Every business or organization must have a well defined process that describes when an investigation can be initiated. At a minimum, most corporate policies require that employers have a ____ that a law or policy is being violated.

A) confirmed suspicion
B) proof
C) court order stating
D) reasonable suspicion
D
3
When recovering evidence from a contaminated crime scene, if the temperature in the contaminated room is higher than ____ degrees, you should take measures to prevent a hard disk from overheating to prevent damage.

A) 80
B) 90
C) 95
D) 105
A
4
A(n) ____ should include all the tools you can afford to take to the field.

A) initial-response field kit
B) extensive-response field kit
C) forensic lab
D) forensic workstation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Investigating and controlling computer incident scenes in the corporate environment is ____ in the criminal environment.

A) much easier than
B) as easy as
C) as difficult as
D) more difficult than
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
ISPs can investigate computer abuse committed by their customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.

A) bit-stream copy utility
B) extensive-response field kit
C) initial-response field kit
D) seizing order
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Courts consider evidence data in a computer as ____ evidence.

A) physical
B) invalid
C) virtual
D) logical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The reason for the standard practice of securing an incident or crime scene is to expand the area of control beyond the scene's immediate location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Confidential business data included with the criminal evidence are referred to as ____ data.

A) commingled
B) exposed
C) public
D) revealed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Evidence is commonly lost or corrupted through ____, which involves police officers and other professionals who aren't part of the crime scene processing team.

A) onlookers
B) HAZMAT teams
C) FOIA laws
D) professional curiosity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Corporate investigators always have the authority to seize all computers equipments during a corporate investigation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The FOIA was originally enacted in the ____.

A) 1940s
B) 1950s
C) 1960s
D) 1970s
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Most federal courts have interpreted computer records as ____ evidence.

A) conclusive
B) regular
C) hearsay
D) direct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Law enforcement investigators need a(n) ____ to remove computers from a crime scene and transport them to a lab.

A) evidence custody form
B) FOIA form
C) affidavit
D) warrant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ is facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed.

A) Reasonable cause
B) Probable cause
C) A subpoena
D) A warrant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Generally, computer records are considered admissible if they qualify as a ____ record.

A) hearsay
B) business
C) computer-generated
D) computer-stored
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ records are data the system maintains, such as system log files and proxy server logs.

A) Computer-generated
B) Business
C) Computer-stored
D) Hearsay
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
A judge can exclude evidence obtained from a poorly worded warrant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
If a corporate investigator follows police instructions to gather additional evidence without a search warrant after you have reported the crime, you run the risk of becoming an agent of law enforcement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
agencies must comply with these laws and make documents they find and create available as public records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
fingerprints can be tested with these systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
The most common computer-related crime is ____.

A) homicide
B) check fraud
C) car stealing
D) sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Some computer cases involve dangerous settings. For these types of investigations, you must rely on the skills of _________________________ teams to recover evidence from the scene.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Real-time surveillance requires ____ data transmissions between a suspect's computer and a network server.

A) poisoning
B) sniffing
C) blocking
D) preventing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Certain files, such as the ____ and Security log in Windows XP, might lose essential network activity records if the power is terminated without a proper shutdown.

A) Password log
B) Word log
C) Io.sys
D) Event log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
you should rely on this when dealing with a terrorist attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
When an investigator finds a mix of information, judges often issue a(n) _________________________ to the warrant, which allows the police to separate innocent information from evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
covert surveillance product
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
One technique for extracting evidence from large systems is called ____.

A) RAID copy
B) RAID imaging
C) large evidence file recovery
D) sparse acquisition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
sets standards for recovering, preserving, and examining digital evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
secondhand or indirect evidence, such as an overheard conversation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
During an investigation involving a live computer, do not cut electrical power to the running system unless it's an older ____ or MS-DOS system.

A) Windows XP
B) Windows 9x
C) Windows NT
D) Windows Me
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
what most cases in the corporate environment are considered
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
_____________________ can be any information stored or transmitted in digital form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
a data-collecting tool
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have a(n) _________________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
When seizing computer evidence in criminal investigations, follow the ____ standards for seizing digital data.

A) Homeland Security Department
B) Patriot Act
C) U.S. DoJ
D) U.S. DoD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Private-sector organizations include businesses and _________________________ that aren't involved in law enforcement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match each item with a statement below
a.Innocent information
f.Low-level investigations
b.AFIS
g.Hearsay
c.EnCase Enterprise Edition
h.Spector
d.FOIA
i.HAZMAT
e.IOCE
information unrelated to a computing investigation case
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Give some guidelines on how to video record a computer incident or crime scene.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Illustrate with an example the problems caused by commingled data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
How can you secure a computer incident or crime scene?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Briefly describe the process of obtaining a search warrant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is the plain view doctrine?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe how to use a journal when processing a major incident or crime scene.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Why should companies publish a policy stating their right to inspect computing assets at will?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe the process of preparing an investigation team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What should you do when working on an Internet investigation and the suspect's computer is on?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
How can you determine who is in charge of an investigation?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.