True or false? the tempest program provides guidelines for managing a forensics lab.

Chapter 3 end of chapter questions

Show

Start Long-Term Learning

Get personalized study reminders at intervals optimized for better retention.

Track your progress on this set by creating a folder

Or add to an existing folder

Add this set to a folder

An employer can be held liable for e-mail harassment.

True

Building a business case can involve which of the following?

All of the above

The ASCLD mandates the procedures established for a computer forensics lab.

True

The manager of a computer forensics lab is responsible for which of the following?

a. Necessary changes in lab procedures and software
b. Ensuring that staff members have sufficient training to do the job
c. Knowing the lab objectives

To determine the types of operating systems needed in your lab, two sources of information you could use.

ASCLD - (American Society of Crime Laboratory Directors), common operating systems and platforms used.

What items should your business plan include?

Justification, budget development, approval and acquisition, implementation.

ACE - (AccessData Certified Examiner), HTCN - (High-Tech Crime Network)

The National Cybercrime Training Partnership is available only to law enforcement.

True

Why is physical security so critical for computer forensics labs?

Integrity of the evidence.

If a visitor to your computer forensics lab is a personal friend, it's not necessary to have him or her sign the visitor's log.

False

What three items should you research before ening in a certification program?

requirements, cost, and acceptability in your chosen area of employment.

Large computer forensics labs should have at least _____ exits.

Two

Typically, a(n) _______ lab has a separate storage area or room for evidence.

Forensics

Computer forensics facilities always have windows.

False

The chief custodian of evidence storage containers should keep several master keys.

True

Putting out fires in a computer lab usually requires a ______ rated fire extinguisher.

ABC Fire Extinguisher

A forensic workstation should always have a direct broadband connection to the Internet.

False

Which organization provides good information on safe storage containers?

NISPOM - (National Industrial Security Program Operating Manual)

Which organization has guidelines on how to operate a computer forensics lab?

ASCLD

What term refers to labs constructed to shield EMR emissions?

TEMPEST

Please allow access to your computer’s microphone to use Voice Recording.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrometo use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Chapter 3 (The Investigator’s Office and Laboratory)Review Questions1.To determine the types of operating systems needed in your lab, list twosources of information you could use.

Get answer to your question and much more

2.What items should your business plan include?

Get answer to your question and much more

3.List two popular certification systems for computer forensics.

Get answer to your question and much more

4.Why is physical security so critical for computer forensics labs?

Get answer to your question and much more

Which of the following is a responsibility of a digital forensics lab manager?

The role holders' core tasks will be to manage resources and staffing, monitor performance, drive efficiency, motivate and manage professional development of staff. They will write laboratory policy documents and procedures for incorporation into the quality management system.

Which agency introduced training on software for forensics investigations by the early 1990s?

By the early 1990s, specialized tools for computer forensics were available. The International Association of Computer Investigative Specialists (IACIS) introduced training on software for forensics investigations, and the IRS created search-warrant programs.

What is the purpose of the reconstruction function in a forensics investigation?

Forensic crime scene reconstruction is the process of determining the sequence of events about what occurred during and after a crime. Crime scenes may be reconstructed through the study and interpretation of scene patterns and the examination of physical evidence.

Why is physical security so critical for computer forensics labs?

Physical security is one of the most important aspects of a digital forensics lab. It ensures that all employees and visitors have access to the building and their workstations while preventing malicious activity within the lab.