Deck 9: The Future of E-Discovery
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Question
Match between columns
Question
Match between columns
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 9: The Future of E-Discovery
1
Which law proposed by the European Parliament would require explicit consent to being tracked on Web sites?
A) Cookie Law
B) Wiretap Act
C) FOIA
D) Fourth Amendment
A) Cookie Law
B) Wiretap Act
C) FOIA
D) Fourth Amendment
A
2
When exigent circumstances exist, a warrant is always needed to search property.
False
3
Which of the following rules and regulations does the ArchiveSocial Web site NOT claim to follow?
A) FINRA
B) SEC
C) Cookie Law
D) Sarbanes-Oxley Act
A) FINRA
B) SEC
C) Cookie Law
D) Sarbanes-Oxley Act
C
4
Under what circumstances may police search data on a cell phone taken from a man that is arrested?
A) in all circumstances
B) in no circumstances
C) when the phone is powered on
D) in exigent circumstances
A) in all circumstances
B) in no circumstances
C) when the phone is powered on
D) in exigent circumstances
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Privacy laws have kept pace with technology advancements quite closely.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
If a backpack is carried by a suspect who is arrested, police may inventory its contents?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is the capability to store a variety of communication types in the same inbox?
A) BYOA
B) event data recording
C) unified messaging
D) common message digest
A) BYOA
B) event data recording
C) unified messaging
D) common message digest
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Accessing voicemail stored on the service provider's servers requires a subpoena or a warrant.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which concept is illustrated by the scenario in which a person's car is searched after it has been impounded for being illegally parked?
A) search incident to arrest
B) closed container
C) immediate control
D) inventory search
A) search incident to arrest
B) closed container
C) immediate control
D) inventory search
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The Fourth Amendment states that an expectation of privacy inside the home is considered reasonable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
When the Recycle Bin is emptied in Windows, the files it contains can no longer be recovered.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The proposed OCGPA amendment to the ECPA does which of the following?
A) restricts tracking citizens using GPS locators
B) enables law enforcement warrantless access to all electronic communications
C) requires organizations to notify people when personal information about them is collected
D) restricts eavesdropping on mobile devices
A) restricts tracking citizens using GPS locators
B) enables law enforcement warrantless access to all electronic communications
C) requires organizations to notify people when personal information about them is collected
D) restricts eavesdropping on mobile devices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following poses a security risk in the form of embedded malware?
A) unified messaging
B) DEFR
C) BYOA
D) GPS tracking
A) unified messaging
B) DEFR
C) BYOA
D) GPS tracking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
ISO 27037:2012 was developed for which of the following purposes?
A) to address readiness for digital investigations
B) to describe how to respond to an investigation after the fact or in real time
C) to teach law enforcement about digital evidence tampering
D) to replace the FRCP in criminal cases
A) to address readiness for digital investigations
B) to describe how to respond to an investigation after the fact or in real time
C) to teach law enforcement about digital evidence tampering
D) to replace the FRCP in criminal cases
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is authorized and trained to collect and transport digital evidence at an investigation scene as defined in ISO, 2012.
A) DEFR
B) BYOA
C) EDR
D) PIPEDA
A) DEFR
B) BYOA
C) EDR
D) PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
If you suspect computer discovery material has been deleted or altered, what should you try to acquire?
A) hard copies of files
B) hard drive image
C) copies of files on a removable disk
D) the file allocation table
A) hard copies of files
B) hard drive image
C) copies of files on a removable disk
D) the file allocation table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which case illustrated a Fourth Amendment violation of "search incident to arrest?"
A) California v. Acevedo
B) Chimel v. California
C) Schlossberg v. Solesbee
D) United States v. Kolon Indus., Inc.
A) California v. Acevedo
B) Chimel v. California
C) Schlossberg v. Solesbee
D) United States v. Kolon Indus., Inc.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Files that are stored in the cloud storage service called DropBox are never copied to the computer from which they are accessed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is true about ECPA and SCA?
A) only stored e-mail is protected
B) they guarantee privacy for all electronic communication
C) they are ahead of technological advances
D) e-mail older than 180 days requires a subpoena
A) only stored e-mail is protected
B) they guarantee privacy for all electronic communication
C) they are ahead of technological advances
D) e-mail older than 180 days requires a subpoena
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which controversial technology did the NHTSC propose legislation to make them mandatory for all new cars?
A) EDRs
B) DVRs
C) Cloud storage
D) GPS trackers
A) EDRs
B) DVRs
C) Cloud storage
D) GPS trackers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
When a(n) __________ request is filed, government agencies must produce this information in a reasonable amount of time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
An officer is allowed to search a(n) ____________ person and his or her immediate surroundings.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
At the end of 2012, a new _______ standard was created to help set more specific guidelines for digital evidence in an attempt to standardize practices worldwide.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The ____________ Amendment of the United States constitution covers unreasonable search and seizure without probable cause.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
One new product is Recommind, which uses ____________ coding to sort through thousands of terabytes of data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Mobile devices that access a company's wireless network show up in the network server ________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
With the advent of the Internet and related technology, _________ concerns extended to places such as e-mail and voicemail.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Police can search a suspect's shoulder bag when that suspect is arrested due to the principal of ___________ searches.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Another challenge that has plagued the digital forensics community has been qualifications for digital forensics ______________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The OCGPA severely restricts tracking citizens by using _________ locators in mobile devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the principle of "closed container" with respect to a computer? Give an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What new bill was proposed as a result of the Petraeus scandal with respect to GPS tracking? Describe that bill.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe how privacy can be an issue with cloud storage.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe anti-forensics. What are some anti-forensics behaviors?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are some of the questions raised by technological advances such as the cloud?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe United States v. Karo and how the Fourth Amendment came into play in that case.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What are some of the data that might be found on mobile devices and where might the data be stored?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What has been done to address the lack of standards for digital forensics investigators?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does ISO 27037:2012 help with the fact that law often lags behind technology?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe the "search incident to arrest" principle and how it was applied in Chimel v. California.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck