Upgrade to remove ads
Terms in this set (109)
What is the trim feature
controls slack space on SSDs
The __________OSI layer serves as a window for uses and application process to access the network service
What file extension is normally used to distinguish a bitlocker decryption key
What is apart of the Fair and accurate credit transactions act of 2003
free credit report
truncation of social security numbers
What does OSI stand for
open source interconnection
Name the acts that work to restrict child pornography on the internet
CP & OA
What does CDA stand for
communications decency act
what does the CDA regulate
Wire act of 1961
prosecuting online sports wagering and bookmarking activities
anything stored or transmitted on electronic or optical media
T/F US courts accept digital evidence as physical evidence
When is a computer generated record considered authentic
if the program that created the output is functioning correctly
Which supreme court case stated the need for secondary warrants
US vs Campos
Name three legislations for privacy
Federal Wiretap Act
Stored Communications Act
Which doctrine mandates employers to inform their workers of any surveillance while using company computers?
What does the federal wiretap act 18 USC Sec 2511 prevent
What does the FISA do?
allowed more invasive searches - not required criminal activity
What is nonrepudiation
preventing a user from denying a transaction
If an item is intended to be published, it cannot be seized. Which act does this describe?
Privacy protection act
What does DMCA stand for
Digital Millennium Copyright Act
Which act extended protections of the federal wiretap act to cordless and cellular
Title IX of the patriot act states
Stored communications act
protects unauthorized access to electronic communications in electronic storage
Three rules of forensic hashing
1) You cant predict the hash value of a file or device
2) no two hash values can be the same
3) if anything changes in file or device the hash value changes
What is the purpose of the Digital Millennium Copy Act?
The DMCA updates copyright laws to prevent newer forms of media from being distributed digitally without the authors permission
What is data stripping
data is fragmented and placed on various servers
Name one example of a warrantless search
waiving fourth amendment rights
What does CPPA stand for
child pornography and prevention act
recommendations while testifying during cross examination
do not answer if do not know, be aware of leading questions
Which on-scene personal team is responsible for bagging and tagging
Name any two traditional equipment used during the seizure process
evidence tape, packing tape, diagonal cutters
what temperature should tech evidence be stored at to preserve it
what enables investigators to quickly search for keywords applicable to the current investigations
What is different about a judicial or regulatory hearing
no jury is present
Typical order of a criminal trial
Motion in limine
empaneling the jury
prosecution questioning and cross examination
defense questioning and cross examination
What rule allows a duplicate instead of the originals when it is produced by the same impression as the original
federal rules of evidence
What is steganography?
a type of encryption
mathematical formula that translates a file into hexadecimal code value, or hash value
if a bit or byte in the file changes, it alters the digital hash
_____ is the disk management platform employed by a particular operating system
Unlawful Internet Gambling Enforcement Act
-reduced flow of money to online gambling sites by regulating payment systems
Congress changed the original language found in the CPPA to include any digital image "that is or is _____ from that of a minor engaging in a sexually explicit" conduct.
____, or the Stored Communications Act, provides protection to stored communications.
What is an email header?
It is a record of where the email traveled.
read bottom to top
When at a crime scene, what are 4 non-specific things to photograph?
1. Entire Scene
3. Desks and area surrounding the computer
4. Notes, stickies, and paper products surrounding the computer
How many titles in US patriot act
federal requirements to qualify as an expert witness
four years experience
ten years of any published writings
What do both Ferber and Osborne recognize
the states compelling interest in protecting children from harm
The Unlawful internet gambling enforcement act of 2006 is an example of government step in or government ________
intervention or regulation
The __________ was specifically made to protect families and children from online sexually explicit material.
The _________ of 1980 made it unlawful for local, state, or federal law enforcement authorities to search and seize those materials which may be publishable
Privacy protection act or PPA
_______ vs Free speech coalition strikes down CPPA
What is not apart of 3 prong test
A. Is it offensive to average person and community standards?
B. Is it a patently offensive depicition of sexual conduct or excretory functions?
C. Does it lack societal value?
D. Does it require payment to view it?
In which decade was the Three Prong Test developed?
Name 1 provision of FACTA
Free Credit Report
Active Duty Alerts
ITADA was the first act to make the possession of anothers ______ a crime
What did the Fair and Accurate Credit Transactions Act (FACTA) 2003 specifically target
What is the input, alteration, erasure, or suppression of computer data or programs?
What are the parts of the three-tiered approach?
FATF stands for
financial action task force
ITADA stands for
identity theft and assumption deterrence act
What did NIIPA make illegal
accessing computer system without/or in excess of authorization causing damage to computers
The ___________ prohibits the disclosure of SSNs and other personal information from a motor vehicle record in any situation not expressly permitted under the law
drivers privacy protection act
Perhaps the most controversial tool in the FBI's investigative arsenal was the now obsolete sniffing program _________.
What is apart of the Financial Modernization Act of 1999?
Financial privacy rule
garcinia cambogia rule
what is the hacking statue
felony to access a computer without authorization
What act lead to increased personal identity protection?
Which OSI layer does TCP/IP belong to
What is found in the physical layer
What layer has the end user layer
What is the name of the database that google info is stored in?
What are the seven phases of the cyber kill chain
Command and control
Actions on objectives
What are the five disciplines that enterprise leaders should consider when formulating a successful collaboration strategy and planning a robust security posture?
Security by design
What is the reason the author states "Determining the identity or location of a cyber attacker is incredibly difficult because "
There is no physical evidence to collect or observe
Sophisticated hackers can cover their digital attacks
What type of computers will soon render some of our strongest encryption useless, cracking high-entropy keys in second thanks to their ability to quickly work out the long prime numbers used to generate them
Name one platform, a repository for code, that posses risk to companies?
Which of the following is not a basic condition for a witness to testify as an expert witness
a) the witness must be shown to be qualified as a true expert in the field
b) expert witness must first describe the data (facts)
c) expert must be over 18
d) an opinion based on special knowledge
What is destroying a report before the final resolution of a case called
______ ______ is the process of qualifying a witness as an export
List three examples of forensic software we discussed in class used by professionals
FTK, EnCase, Axiom, Nuix
two types of write blocking are
What are the five functions for computer forensics tools
A computer can be ______
a. the target of a crime
b. used as an instrument to facilitate a crime
c. incidental to a crime, but an important source of evidence
d. all of the above
evidence that indicates a suspect is guilty of a crime with which he or she is charged is ______
What are the five rules of evidence that need to be followed in order for evidence to be useful
What 4 characteristics must a device posses to be considered a computer?
What is malicious code?
A program created to modify, destroy or steal info, use up resources on a computer network or allow unauthorized access to your computer or network
2 computer forensics data acquisitions formats
the default evidence file created by a proprietary format is
uncompressed image files
list an advantage of using a tape backup system for forensic acquisitions of large data use
there is no limit to the size of data that can be aquired
___________________ is the process that involves systematically gathering and analyzing digital information for use as evidence in civil, criminal, or administrative cases. It applies forensic procedures to digital evidence.
Computer or digital forensics
What are the minimum requirement for a computer forensics lab of any size
small room with true floor-to-ceiling walls
door access with locking mechanism
vistors log listing all people who have accessed the lab
List three items that should be on an evidence custody form.
Name 2 required computer forensic software or hardware when configuring a computer workstation or laptop as a forensic workstation
computer forensic analysis tool
What are the three steps of physical examination at a crime scene
check peripheral devices for make and model
check settings on peripheral devices
look for damage or modifications
Attorney client privilege involves an investigation is done at the request and direction of _____ in order to gather facts so that the business can offer an _____.
Which of the following would be most helpful in a case where the suspect was accused of using P2P (i.e. torrenting software like LimeWire, BitTorrent, etc.) software to pirate movies?
Network logs obtained from routers, network firewalls, etc
What does BIOS stand for?
Basic Input/Output System
image-to-image is not a method of acquiring data for forensic analysis (T/F)
An affidavit is
given under penalty of perjury
often used to justify a warrant
________ is a computer drive configuration containing 2 or more disks
Data acquisitioning tool
ASCLD offers guidelines for
Managing a Lab
auditing lab functions and procedures
acquiring an official certification
what does RAID stand for?
Redundant Array of Independent Disks
what are all different types of acquisitions
The "Guide For First Responders" , a manual on procedures to follow for search and seizure of computers is maintained by the U.S. ______________ .
Department of justice
List three items that should be in your case report.
Listing of evidence seized
a narrative of what steps you took
a description of your findings
What name refers to labs constructed to shield EMR emissions
What does a logical acquisition collect for an investigation?
only specific files of interest to the case
YOU MIGHT ALSO LIKE...
digital age crime and terrorism
Criminology Today Chapter 13
Digital Forensics exam 1
Computer Forensics IT357 Final Exam
OTHER SETS BY THIS CREATOR
OTHER QUIZLET SETS
Approaches - Psychodynamics
Clinical Medicine: Psoriasis
Test Three review
Environmental Science Chapter 7