100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Test Bank for Guide to Computer Forensics and Investigations, 7th Edition by Bill Nelson $29.49   Add to cart

Exam (elaborations)

Test Bank for Guide to Computer Forensics and Investigations, 7th Edition by Bill Nelson

 65 views  0 purchase
  • Course
  • Computer Concepts
  • Institution
  • Computer Concepts

Test Bank for Guide to Computer Forensics and Investigations, 7e 7th Edition by Bill Nelson, Amelia Phillips, Christopher Steuart. Complete Modules are included with answers (Module 1 to 15) 1. Understanding the Digital Forensics Profession and Investigations. 2. Report Writing and Testimony fo...

[Show more]

Preview 4 out of 227  pages

  • August 31, 2024
  • 227
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Computer Concepts
  • Computer Concepts
avatar-seller
Tutor247
Name: Class: Date:

Mod 01: Understanding the Digital Forensics Profession and Investigations

1. Mahmood is examining a device for digital evidence. There are two types of evidence he is looking for.
Which type of evidence will prove that his client is not guilty?
a. Inculpatory evidence
b. Exculpatory evidence
c. Miaculpatory evidence
d. Discretionary evidence
ANSWER: b
RATIONALE: Mahmood is looking for exculpatory evidence which is evidence that tends to show
that a defendant is not guilty of the crime they have been charged with. This type of
evidence can help to exonerate or clear the defendant of the charges. Exculpatory
evidence can include physical evidence, witness statements, or other types of
evidence that support the defendant's innocence.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.1 - Describe the field of digital forensics
TOPICS: An Overview of Digital Forensics
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

2. What are the main differences between public-sector investigations and private-sector investigations?

a. Private-sector investigations involve government agencies responsible for criminal investigations and
prosecution. Public-sector investigations focus more on policy violations.
b. Private-sector investigations can become criminal investigations and public-sector investigations can
become civil investigation depending upon the circumstances.
c. Public-sector investigations involve government agencies responsible for criminal investigations and
prosecution. Private-sector investigations focus more on policy violations.
d. The private sector can ignore criminal investigations, and the public sector can ignore civil
investigations.
ANSWER: b, c
RATIONALE: In general, the main difference between public-sector and private sector
investigations is that the public-sector investigations involve government agencies
responsible for criminal investigations and prosecution. Government agencies range
from municipal, county, and state or provincial police departments to federal law
enforcement agencies. These organizations must observe legal guidelines of their
jurisdictions. Private-sector investigations focus more on policy violations. However,
criminal acts, such as corporate espionage, can also occur. So, although private-sector
investigations often start as civil cases, they can develop into criminal cases;
likewise, a criminal case can have implications leading to a civil case.
POINTS: 1
QUESTION TYPE: Multiple Response
Page 1

,Name: Class: Date:

Mod 01: Understanding the Digital Forensics Profession and Investigations

HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

3. When conducting a computer investigation for potential criminal violations of the law, the legal processes
you follow depend on local customs, legislative standards, and rules of evidence. In general, however, a
criminal case follows three stages. What are those three stages?
a. Complaint, the investigation, and the prosecution
b. Complaint, discovery, and the trial
c. Complaint, service of process, and motions
d. Complaint, answer, discovery, and trial
ANSWER: a
RATIONALE: If it has been determined that a crime has been committed, it is sent to the prosecutor
to prosecute the case. Hence, there is a complaint, an investigation, and then the
prosecution.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Remember/Understand
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

4. You're the head of the executive management committee and as part of your corporate governance duties you
must implement a policy to define and limit who has authorization to request a computer investigation and
forensics analysis (authorized requestor). Which group or groups should have the authority to request a
computer investigation?
a. The human resources department
b. The corporate ethics office
c. The general counsel or legal department
d. The accounting department
ANSWER: b, c
RATIONALE: The reason the corporate ethics office and general counsel's office should only be
involved in authorizing investigations is that other groups within the organization
might create false allegations of misconduct to prevent competing departments from
delivering a proposal for the same source of funds.
Page 2

,Name: Class: Date:

Mod 01: Understanding the Digital Forensics Profession and Investigations

POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Apply
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

5. Allen works for a small newspaper. There is no corporate security investigations group, no written or verbal
acceptable use policy, and the publisher (owner) owns the rights to all the computer hardware and software.
One day, the publisher calls him into the office and asks him to help them with an email problem. Upon fixing
the problem Allen discovers that there are illicit photos (no one was underage) on the publisher's laptop. The
publisher later asks Allen to sanitize the laptop because the publisher wants to give it to their grandson. Allen
must go through the laptop to find all the photos. What can Allen do to stop this work behavior?
a. Report the publisher to Human Resources
b. File a hostile work environment claim
c. Sanitize the laptop and do nothing else
d. Refuse to do the job
ANSWER: b
RATIONALE: In this situation, no laws are broken. There is no written or verbal acceptable use
policy so there is no legal recourse for the publisher's actions other than Allen filing a
claim citing a hostile work environment.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Apply
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

6. As head of Zenon's corporate IT department, Naya is tasked with analyzing the corporate mobile device
policy. She needs to decide which is better, company owned mobile devices or BYOD? As a member of the
corporate security team, Naya asks you for advice on which you think will be more appropriate. When you
examine all options, which environment do you think works best for Zenon?
a. With company owned devices, it falls on the employee to keep them updated.
b. With company owned devices, all apps, files, and email can be secured.
c. With BYOD employees own the devices so companies are not liable if anything happens to the
device.
Page 3

, Name: Class: Date:

Mod 01: Understanding the Digital Forensics Profession and Investigations

d. With BYOD, the employee buys the device, and the company can lock it down (mobile device
management).
ANSWER: b, d
RATIONALE: The issues relating to BYOD versus company owned devices have been argued
amongst corporate IT managers for years. On the one hand, having a BYOD policy
frees companies from having to purchase smart phones for employees and saves them
money. But on the other hand, having a corporate owned device means a more
secure environment. It is a matter of corporate policy that determines what the smart
phone policy is.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
KEYWORDS: Bloom's: Analyze/Create/Evaluate
DATE CREATED: 4/18/2024 2:41 PM
DATE MODIFIED: 4/18/2024 2:41 PM

7. Thanks to the dark web, anybody can access computer programs that will help users exfiltrate (remove) data
from any type of computer or network. Because of this activity, white-collar crime and industrial espionage are
on the rise. How does white-collar-crime compare to industrial espionage?
a. White-collar crime refers to financial crimes committed in a business or professional setting, while
espionage refers to the unauthorized sharing of confidential information to a competitor or foreign
entity.
b. Espionage refers to financial crimes committed in a business or professional setting, while white
collar crime refers to the unauthorized sharing of confidential information to a competitor or foreign
entity.
c. White-collar crime is the same as espionage and are both punishable offenses.
d. White-collar crime and espionage are victimless crimes.
ANSWER: a
RATIONALE: The cost of white-collar crime and espionage to companies can vary greatly and is
difficult to quantify with precision. However, the fiscal impact can be substantial and
goes far beyond financial losses. However, in general white-collar crime refers to
financial crimes committed in a business or professional setting, while espionage
refers to the unauthorized sharing of confidential information to a competitor or
foreign entity.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ceng.GuideForens.25.1.2 - Explain how to prepare for computer investigations and
summarize the difference between public-sector and private-sector investigations
TOPICS: Preparing for Digital Investigations
Page 4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Tutor247. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $29.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73918 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$29.49
  • (0)
  Add to cart