Deck 2: The Investigators Office and Laboratory
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
العب
ملء الشاشة (f)
Deck 2: The Investigators Office and Laboratory
1
_______ is a specialized viewer software program.
A)FastView
B)IrfanView
C)ThumbsLoader
D)ABSee
A)FastView
B)IrfanView
C)ThumbsLoader
D)ABSee
B
2
Which file system below is utilized by the Xbox gaming system?
A)NTFS
B)ReFS
C)EXT
D)FATX
A)NTFS
B)ReFS
C)EXT
D)FATX
D
3
In order to qualify for the Certified Computer Forensic Technician, Basic Level certification, how many hours of computer forensics training are required?
A)10
B)20
C)30
D)40
A)10
B)20
C)30
D)40
D
4
The shielding of sensitive computing systems and prevention of electronic eavesdropping of any computer emissions is known as FAUST by the U.S. Department of Defense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
The recording of all updates made to a workstation or machine is referred to as configuration management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Candidates who complete the IACIS test successfully are designated as a _______.
A)Certified Forensic Computer Examiner (CFCE)
B)Certified Forensics Investigator (CFI)
C)Certified Investigative Forensics Examiner (CIFE)
D)Certified Investigative Examiner (CIE)
A)Certified Forensic Computer Examiner (CFCE)
B)Certified Forensics Investigator (CFI)
C)Certified Investigative Forensics Examiner (CIFE)
D)Certified Investigative Examiner (CIE)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
_______ describes the characteristics of a safe storage container.
A)ISO2960
B)NISPOM
C)SSO 990
D)STORSEC
A)ISO2960
B)NISPOM
C)SSO 990
D)STORSEC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
In order to qualify for the Advanced Certified Computer Forensic Technician certification, a candidate must have _______ years of hands-on experience in computer forensics investigations.
A)two
B)three
C)five
D) six
A)two
B)three
C)five
D) six
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which tool below is not recommended for use in a forensics lab?
A)2.5-inch adapters for drives
B)FireWire and USB adapters
C)SCSI cards
D)Degausser
A)2.5-inch adapters for drives
B)FireWire and USB adapters
C)SCSI cards
D)Degausser
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which option below is not one of the recommended practices for maintaining a keyed padlock?
A)Appoint a key custodian.
B)Take inventory of all keys when the custodian changes.
C)Use a master key.
D)Change locks and keys annually.
A)Appoint a key custodian.
B)Take inventory of all keys when the custodian changes.
C)Use a master key.
D)Change locks and keys annually.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which operating system listed below is not a distribution of the Linux OS?
A)Minix
B)Debian
C)Slackware
D)Fedora
A)Minix
B)Debian
C)Slackware
D)Fedora
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
In order to qualify for the Certified Computer Crime Investigator, Basic Level certification, candidates must provide documentation of at least _______ cases in which they participated.
A)5
B)10
C)15
D)20
A)5
B)10
C)15
D)20
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
_______ can be used to restore backup files directly to a workstation.
A)Belarc Advisor
B)Norton Ghost
C)ProDiscover
D)Photorec
A)Belarc Advisor
B)Norton Ghost
C)ProDiscover
D)Photorec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
?What certification program, sponsored by ISC2, requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations?
A)?Certified Computer Crime Investigator
B)?Certified Forensic Computer Examiner
C)Certified Cyber Forensics Professional
D)EnCase Certified Examiner
A)?Certified Computer Crime Investigator
B)?Certified Forensic Computer Examiner
C)Certified Cyber Forensics Professional
D)EnCase Certified Examiner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Linux Live CDs and WinFE disks do not automatically mount hard drives, but can be used to view file systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Because they are outdated, ribbon cables should not be considered for use within a forensics lab.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
A disaster recovery plan ensures that workstations and file servers can be restored to their original condition in the event of a catastrophe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
A TEMPEST facility is designed to accomplish which of the following goals?
A)Prevent data loss by maintaining consistent backups.
B)Shield sensitive computing systems and prevent electronic eavesdropping of computer emissions.
C)Ensure network security from the Internet using comprehensive security software.
D)Protect the integrity of data.
A)Prevent data loss by maintaining consistent backups.
B)Shield sensitive computing systems and prevent electronic eavesdropping of computer emissions.
C)Ensure network security from the Internet using comprehensive security software.
D)Protect the integrity of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
_______ is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence.
A)The lab manager
B)The lab investigator
C)The lab secretary
D)The lab steward
A)The lab manager
B)The lab investigator
C)The lab secretary
D)The lab steward
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which option below is not a recommendation for securing storage containers?
A)The container should be located in a restricted area.
B)Only authorized access should be allowed, and it should be kept to a minimum.
C)Evidence containers should remain locked when they aren't under direct supervision.
D)Rooms with evidence containers should have a secured wireless network.
A)The container should be located in a restricted area.
B)Only authorized access should be allowed, and it should be kept to a minimum.
C)Evidence containers should remain locked when they aren't under direct supervision.
D)Rooms with evidence containers should have a secured wireless network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
As part of a business case, _______________ requires researching different products to determine which one is the best and most cost effective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match the terms with the correct definitions?.
-?A facility that can be locked and allows limited access to the room's contents
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-?A facility that can be locked and allows limited access to the room's contents
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match the terms with the correct definitions?.
-A term referring to facilities that have been hardened so that electrical signals from computers, the computer network, and telephone systems can't be monitored or accessed easily by someone outside the facility
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-A term referring to facilities that have been hardened so that electrical signals from computers, the computer network, and telephone systems can't be monitored or accessed easily by someone outside the facility
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match the terms with the correct definitions?.
-?A certification from the International Society of Forensic Computer Examiners
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-?A certification from the International Society of Forensic Computer Examiners
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ______________ is a plan that can be used to sell your services to management or clients, in which a justification is made for acquiring newer and better resources to investigate digital forensics cases.
e.Configuration management
e.Configuration management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
_______________ are generated at the federal, state, and local levels to show the types and frequency of crimes committed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match the terms with the correct definitions?.
-?A lab dedicated to computing investigations; typically, it has a variety of computers, OSs, and forensics software
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-?A lab dedicated to computing investigations; typically, it has a variety of computers, OSs, and forensics software
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
How often should hardware be replaced within a forensics lab?
A)Every 6 to 12 months
B)Every 12 to 18 months
C) Every 18 to 24 months
D) Every 24 to 30 months
A)Every 6 to 12 months
B)Every 12 to 18 months
C) Every 18 to 24 months
D) Every 24 to 30 months
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which ISO standard below is followed by the ASCLD?
A)17025:2005
B)17026:2007
C)12075:2007
D)12076:2005
A)17025:2005
B)17026:2007
C)12075:2007
D)12076:2005
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following scenarios should be covered in a disaster recovery plan??
A)damage caused by lightning strikes
B)?damage caused by flood
C)damage caused by a virus contamination
D)all of the above
A)damage caused by lightning strikes
B)?damage caused by flood
C)damage caused by a virus contamination
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
A(n) _______________ acts as an evidence locker or safe to preserve the integrity of evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What percentage of consumers utilize Intel and AMD PCs?
A)60
B)70
C)80
D)90
A)60
B)70
C)80
D)90
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Match the terms with the correct definitions?.
-A national organization that provides certification for computer crime investigators and digital forensics technicians
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-A national organization that provides certification for computer crime investigators and digital forensics technicians
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match the terms with the correct definitions?.
-A certification from ISC2 for completing the education and work experience and passing the exam
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-A certification from ISC2 for completing the education and work experience and passing the exam
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match the terms with the correct definitions?.
-?A document that provides justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-?A document that provides justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match the terms with the correct definitions?.
-?A certificate awarded by IACIS at completion of all portions of the exam
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-?A certificate awarded by IACIS at completion of all portions of the exam
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match the terms with the correct definitions?.
-?The process of keeping track of all upgrades and patches you apply to your computer's OS and applications
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-?The process of keeping track of all upgrades and patches you apply to your computer's OS and applications
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The ________________________ provides guidelines to members for managing a forensics lab and acquiring crime and forensics lab accreditation.?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match the terms with the correct definitions?.
-?The process of determining how much risk is acceptable for any process or operation, such as replacing equipment
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
-?The process of determining how much risk is acceptable for any process or operation, such as replacing equipment
A)Business case
B)Certified Computer Examiner (CCE)
C)Certified Cyber Forensics Professional (CCFP)
D)Certified Forensic Computer Examiner (CFCE)
E)Configuration management
F)Digital forensics lab
G)High Tech Crime Network (HTCN)
H)Risk management
I)Secure facility
J)TEMPEST
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
How long are computing components designed to last in a normal business environment?
A)12 to 16 months
B)14 to 26 months
C)18 to 36 months
D)36 to 90 months
A)12 to 16 months
B)14 to 26 months
C)18 to 36 months
D)36 to 90 months
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is a business case used for?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What should be included as part of the approval process?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
A forensics lab should maintain a paper or electronic sign-in log for all visitors. What information should be in this log?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What information should be recorded every time an evidence container is opened and closed?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What are three questions that should be asked when performing the justification step?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
When creating a new forensics lab, what are some questions that should be considered when calculating the budget required? List at least three questions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
List three practices that should be followed when using a keyed padlock.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
How should backups be stored and maintained?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
List at least three things that should be included in an audit of a digital forensics lab.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What can be done to help prevent the buildup of static electricity?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck

