Question
click below
click below
Question
Normal Size Small Size show me how
Computer Security-23
Chapter 23
Question | Answer |
---|---|
Evidence collected in violation of the fourth amendment of the United States Constitution, the electronic communications privacy act(ECPA) may not be admissible to court under the terms of the__________ | Exclusionary rule |
Evidence that is legally qualified and reliable is ____________________. | Competent Evidence. |
Documents, verbal statements, and material objects admissible in a court of law are called__________ | Evidence |
The rule whereby courts prefer original evidence rather than a copy to ensure that no alteration of the evidence (whether intentional or unintentional) has occurred is termed the ____________________. | Best Evidence Rule. |
Evidence that is convincing or measures up without question is______________ | Sufficient evidence |
____________________ is the preservation, identification, documentation, and interpretation of computer data to be used in legal proceedings. | Forensics. |
___________ is evidence that is material to the case or has a bearing on the matter at hand. | Relevant evidence |
____________________ is the unused space on a disk drive when a file is smaller than the allocated unit of storage. | Slack Space. |
___________ is oral testimony or other evidence that proves a specific fact (such as an eyewitness statement, fingerprint, photo, and so on) the knowledge of the facts is obtained through the five senses as a witness. | Direct evidence |
___________________ is the remaining sectors of a previously allocated file that are available for the operating system to use. | Free Space. |
What defines evidence as being competent___________ | The evidence is legally qualified and reliable |
Which of the following correctly defines evidence as being relevant? | The evidence is material to the case or has a bearing on the matter at hand. |
What is documentary evidence? | Evidence in the form of business records, printouts, manuals, and other items. |
Which of the following correctly defines real evidence? | Tangible objects that prove or disprove a fact. |
What is the definition of the hearsay rule? | Evidence NOT gathered from the personal knowledge of the witness |
Which of the following is the LEAST rigorous investigative method? | Examining the suspect system using its software without verification. |
What is slack space? | The and used space on a disk drive when a file is smaller than the allocated unit of storage(as in a sector). |
Which of the following correctly describes the minimum contents of an evidence control log book? | Description, Investigator, Case # Date, Time, Location, Reason. |
What is a message digest? | An algorithm that applies method of operations to a data stream to calculate a unique number based on the information contained in the data stream |
Which of the following correctly describes the chain of custody for evidence? | Accounts for all persons who handled or had access to a specific item of evidence. |
What defines evidence as being sufficient? | The evidence is convincing or measures up to without question |
Which of the following correctly defines the exclusionary rule? | Any evidence collected in violation of the Fourth Amendment is not admissible as evidence. |
What is the definition of free space? | The remaining sectors of a previously allocated file that are available for the operating system to use |
If you are investigating a computer incident, and you need to remove the diskdrive from a computer and replace it with a copy so the user doesn't know it has been exchanged, how many copies of the disk should you make, and how should they be used? | Four copies: one is to replace the removed drive; one is marked, sealed, logged, and stored with the original, unmodified disk as evidence; one is for file authentication; and one is for analysis. |
What is the process of acquiring evidence? | Dump the memory, power down the system, create an intimate of the system, and analyze the image. |