Chapter 4 ETI

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Chapter 4 ETI

1. Digital forensics is all of them except:


Answer:

Manipulation of computer data

2. IDIP stands for


Answer:

Integrated Digital Investigation Process

3. The digital evidence are used to establish a credible link between____


Answer:

Attacker and victim and the crime scene

4. Digital evidences must follow the requirements of the ______________.


Answer:

Best Evidence Rule

5. From the two given statements 1 and 2 , select the correct options from a-d. 1): Original
media can be used to carry out digital investigation process. 2): By default, every part of the
victim’s computer is considered unreliable.
Answer:

a is true and b is false

6. The evidences or proof that can be obtained from the electronic source is called
the_______
Answer:

digital evidence

7. Which of the following is not a type of volatile evidence?


Answer:

Log files
8. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following
is NOT a significant drawback to this approach?
Answer:

Responsibility for incident resolution frequently does not reside with the security
professional, but with management.

9. .When cases got to trial your forensics examiner play one of ____ role.
Answer:

10. Computers were involved in the investigations into both World Trade Center attacks.
Answer:

True

11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
Answer:

True

12. An argument for including computer forensic training computer security specialists is:
Answer:

It teaches them when it is time to call in law enforcement.

13. A valid definition of digital evidence is:


Answer:

Digital data of probative value

14. All forensic examinations should be performed on the original digital evidence.
Answer:

False

You might also like