Filters
Question type

Study Flashcards

What is a business case used for?​

Correct Answer

verifed

verified

A business case is used to sel...

View Answer

A(n) _______________ acts as an evidence locker or safe to preserve the integrity of evidence.

Correct Answer

verifed

verified

_______ is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence.​


A) ​The lab manager
B) ​The lab investigator
C) The lab secretary
D) The lab steward

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

List at least three things that should be included in an audit of a digital forensics lab.

Correct Answer

verifed

verified

The following items are all valid for co...

View Answer

Which ISO standard below is followed by the ASCLD?


A) ​17025:2005
B) ​17026:2007
C) 12075:2007
D) 12076:2005

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

​Because they are outdated, ribbon cables should not be considered for use within a forensics lab.

A) True
B) False

Correct Answer

verifed

verified

Match the terms with the correct definitions?. -?A certificate awarded by IACIS at completion of all portions of the exam


A) Business case
B) Certified Computer Examiner (CCE)
C) Certified Cyber Forensics Professional (CCFP)
D) Certified Forensic Computer Examiner (CFCE)
E) Configuration management
F) Digital forensics lab
G) High Tech Crime Network (HTCN)
H) Risk management
I) Secure facility
J) TEMPEST

K) E) and J)
L) C) and G)

Correct Answer

verifed

verified

What are three questions that should be asked when performing the justification step?

Correct Answer

verifed

verified

The following questions are all valid qu...

View Answer

The ________________________ provides guidelines to members for managing a forensics lab and acquiring crime and forensics lab accreditation.?

Correct Answer

verifed

verified

American Society of ...

View Answer

Which file system below is utilized by the Xbox gaming system?​


A) ​NTFS
B) ​ReFS
C) EXT
D) FATX

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Match the terms with the correct definitions?. -A certification from ISC2 for completing the education and work experience and passing the exam


A) Business case
B) Certified Computer Examiner (CCE)
C) Certified Cyber Forensics Professional (CCFP)
D) Certified Forensic Computer Examiner (CFCE)
E) Configuration management
F) Digital forensics lab
G) High Tech Crime Network (HTCN)
H) Risk management
I) Secure facility
J) TEMPEST

K) H) and J)
L) A) and B)

Correct Answer

verifed

verified

Which operating system listed below is not a distribution of the Linux OS?


A) Minix
B) ​Debian
C) Slackware
D) Fedora

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

​Which option below is not a recommendation for securing storage containers?


A) ​The container should be located in a restricted area.
B) ​Only authorized access should be allowed, and it should be kept to a minimum.
C) Evidence containers should remain locked when they aren't under direct supervision.
D) Rooms with evidence containers should have a secured wireless network.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Match the terms with the correct definitions?. -?The process of determining how much risk is acceptable for any process or operation, such as replacing equipment


A) Business case
B) Certified Computer Examiner (CCE)
C) Certified Cyber Forensics Professional (CCFP)
D) Certified Forensic Computer Examiner (CFCE)
E) Configuration management
F) Digital forensics lab
G) High Tech Crime Network (HTCN)
H) Risk management
I) Secure facility
J) TEMPEST

K) G) and J)
L) D) and I)

Correct Answer

verifed

verified

_______ is a specialized viewer software program.


A) ​FastView
B) ​IrfanView
C) ThumbsLoader
D) ABSee

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Which option below is not one of the recommended practices for maintaining a keyed padlock?


A) ​Appoint a key custodian.
B) Take inventory of all keys when the custodian changes.
C) Use a master key.
D) Change locks and keys annually.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

As part of a business case, _______________ requires researching different products to determine which one is the best and most cost effective.​

Correct Answer

verifed

verified

acquisitio...

View Answer

Match the terms with the correct definitions?. -A term referring to facilities that have been hardened so that electrical signals from computers, the computer network, and telephone systems can't be monitored or accessed easily by someone outside the facility


A) Business case
B) Certified Computer Examiner (CCE)
C) Certified Cyber Forensics Professional (CCFP)
D) Certified Forensic Computer Examiner (CFCE)
E) Configuration management
F) Digital forensics lab
G) High Tech Crime Network (HTCN)
H) Risk management
I) Secure facility
J) TEMPEST

K) A) and I)
L) G) and J)

Correct Answer

verifed

verified

Which of the following scenarios should be covered in a disaster recovery plan??


A) damage caused by lightning strikes
B) ?damage caused by flood
C) damage caused by a virus contamination
D) all of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

​In order to qualify for the Certified Computer Forensic Technician, Basic Level certification, how many hours of computer forensics training are required?


A) ​10
B) ​20
C) 30
D) 40

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer