Natural Driving Quiz

Improved Essays
DIGITAL FORENSIC AND INCIDENT REPORTING QUIZ
1. Destroying data, on a hard drive, is relatively easy and can be done one of two ways:
a. Destroying the platters
b. Wiping the entire hard drive
c. Placing magnets on a hard drive
d. Simply formatting a hard drive
2. __________________________ is a list of people who have had physical possession of the evidence.
Chain of custody
3. What is a hashing algorithm?
A utility designed to create a binary or hexadecimal number that represents the uniqueness of a data set, such as a file or entire disk.
4. In a criminal investigation, probable cause is needed for a criminal investigation.
a. True
b. Fals
5. An computer forensics labs should have more than two exits.
a. True
b. False
6.
…show more content…
Testimonial evidence outweigh physical evidence during an investigation.
a. True
b. False
11. The act of ensuring the integrity of data being copied derived from original?
Validation
12. _____________________________________is gives OS a road map to data on a disk , type of file system an OS uses determines how data is stored on the
…show more content…
_________________________________in computer forensics, makes it possible to restore a suspect drive on your virtual machine crucial for specialist to identify potential VM files, artifacts and fragments can be deleted files.
Virtual Machines
14. ________________________________the activity of defrauding an online account holder of financial information by posing as a legitimate company.
Phishing
15. A form of malware that shows ads in the form of pop-ups and banners.
a. malware
b. adware
c. gameware
d. antispyware
16. A policy that computer and network users in a business or school must abide by that forces users to practice safe computing is named Acceptable Use Policy.
a. True
b. False
17. ____________________________is a form of cybercrime that redirects you to a phony website even if you type the right address into your browser
Pharming
18. When wireless encryption is added it helps secure a wireless network by encrypting transmitted data.
a. True
b. False
19. This is a form of computer harassment that happens between two individuals is _____.
Cyberstalking
20. _________________ is a program that appears to be a legitimate program but is actually something malicious instead.
Trojan

Related Documents

  • Superior Essays

    Bullying in the World I am sure that people are aware that not everyone gets a great start to life, like Jeanette Walls in The Glass Castle. Many people across the world struggle with all kinds of hardships. Others think they understand these hardships, but I believe that no one can ever truly understand until they go through it themselves. People who grow up in a better situation could never really know the feeling of being in such a poor situation. One of the major causes of these hardships nowadays is bullying.…

    • 1304 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The NYC computer forensics investigative procedures contain eight stages with electronic tools that are used to support an investigation. The first step that is taken is obtaining a search warrant, & in order to do this there must be probable cause to present to a magistrate. How probable cause is identified is by an investigation, or information obtained in a legal standard& documented by the officer who is seeking the evidence, & he/she must prepare an affidavit that defines the area to be searched, & the evidence being sought (Volonino pp 56). The reason for obtaining a search warrant is so that a defendants Fourth Amendment is not violated.…

    • 652 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Stark Trek is an American science fiction entertainment franchise that was created in 1966. Episode 9 of season 2 was called a The Measure of a Man, which aired on February 11th, 1989. In the episode Data resigns his commission rather than be dismantled for examination by a skilled scientist. A formal hearing is convened to determine whether Data is considered property without rights or a sentient being. The main point to take away from this episode is do we consider a machine, like Data, a human being that has rights or is just a piece of property with no rights?…

    • 560 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    What are the six general categories of criminal law violations? Describe each, and rank the categories in terms of seriousness. Then list and describe the eight general features of crime. What are the “three conjoined principles” that comprise the legal essence of the concept of crime?…

    • 987 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computer technology progressed rapidly since the 1900’s. Computers are no longer scarcely around, many people have them and use them on a daily basis. They have also become an important source of evidence in criminal activities. Computers are very helpful for homicide investigators, because they can discover whether methods on how to murder were researched on the internet, if anything suspicious can be found in emails, or if threats were made towards the victim prior to the murder. Since children can easily get on the computer to use the internet, it gives sexual predators an opportunity to seek out child victims online.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Following the readings and presentations on the mind/body problem, and having read the synopsis and viewed the episode, I have come to believe that Piccard and Maddox view the personhood (or lack thereof) of Data entirely from different perspectives - at least for much of the episode. Piccard, from the very start of the suggestion of disassembling Data to further knowledge and create additional beings like him, is extremely convicted that the very proposal of such an act is not just wrong, but inhumane. Piccard approaches this from the mind/body problem view of dualism. Piccard sees Data both physically and mentally, a view that suggests two properties coinciding within Data - physical properties which "are properties of the body, while mental properties are properties of the mind." (Hasker, 1983, p. 65) For Piccard, referring to Data as a machine or a thing…

    • 592 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    This week’s lab introduces the student to various types of attacks that can be implemented by distributing a Trojan Horse script or by performing a variety of Denial-of-Service attacks (DoS). To begin to understand how these attacks are performed, the student is instilled with the knowledge as well as the use of file-hashes to identify compromised files and also how to generate file-hashes to establish baseline standards, which could benefit a Tripwire type regiment. Then, the lab takes the student through performing the various tasks associated with implementing such attacks by crafting a Trojan horse-like script.…

    • 1971 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Secondly is to protect and secure the useful promising information that is relevant to the computer. An investigator should ensure that no available evidence are damaged, destroyed, or contaminated, and no possible computer virus is brought in to the suspect computer during the forensic inspection. Information represented by physical items, such as computer hardware and printed files, can be described easily by correctly following traditional physical evidence procedures. The actual challenge comes from acquiring evidence stored in these physical items, such as hard drives, CDs, DVDs, zip disks, or floppy disks. All data residing in the suspect computer’s hard drives and disks need to be protected from any potential evidence and this has…

    • 211 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Disaster Recovery

    • 797 Words
    • 4 Pages

    Case Study #2: Disaster Recovery / IT Service Continuity Name Institution Affiliation Case Study #2: Disaster Recovery / IT Service Continuity Overview. Disaster recovery also known as business contingency plan is the ability for a business to be able to deal with any occurring disaster (Snedaker, 2013). We need to know that incase of disasters such data breach it is normally impossible for the business processes to run smoothly.…

    • 797 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Digital Forensics

    • 755 Words
    • 4 Pages

    In preparing for processing the potential crime/incident scene, I would have my digital forensics team to understand and perform the following tasks: identify for potential digital evidence, understand rules of evidence, prepare for the search and seize digital evidence, and to ensure proper storage/chain of evidence processes are properly documented and followed. Computers and digital media are progressively involved in unlawful exercises. The computer maybe contraband, products of the crime, an instrument of the offense, or just a storage that holds evidence of the offense. Investigation of any criminal activity may deliver electronic proof.…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Rummaging through rubbish for personal information (dumpster diving) Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized Using public records about individual citizens, published in official registers such as electoral rolls Stealing bank or credit cards, identification cards, passports, authentication tokens ... typically by pickpocketing, housebreaking or mail theft Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards Using 'contactless' credit card readers to…

    • 459 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The CSI will walk through taking notes on anything needed for the investigations, things such as fingerprint dusting kit, or blood spatter. After it is noted on what equipment is needed, the true heart of the investigation process beings. “Trace evidence is any material such as hairs, fibers, glass, soil, paint, etc., found at a crime scene on a person or object.” This evidence is then used to help find out more information about the crime committed, such as who was there. When finding the trace evidence it is important the following steps are completed: the written down location, the amount collected, the type of material, the condition of the material, and proper packing to help transport the trace evidence to the lab.…

    • 1708 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Introduction Organizations handle vast amounts of data. A large organization may have to deal with terabytes or petabytes worth of data. For a company to be successful, there must be a meaningful way in which the data that is used as a part of company operations is managed. This includes an effective file management system, in which the files are appropriately secured, and the information is backed up in order to meet company requirements. The files generated as a part of company operations are company property, and as such the information must be managed effectively.…

    • 1077 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays