Chapter 3 end of chapter questions Get personalized study reminders at intervals optimized for better retention. Track your progress on this set by creating a folder Or add to an existing folder True All of the above True
a. Necessary changes in lab procedures and softwareStart Long-Term Learning
Add this set to a folder
An employer can be held liable for e-mail
harassment.
Building a business case can involve which of the following?
The ASCLD mandates the procedures established for a computer forensics lab.
The manager of a computer forensics lab is responsible for which of the following?
b. Ensuring that staff members have sufficient training to do the job
c. Knowing the lab objectives
To determine the types of operating systems needed in your lab, two sources of information you could use.
ASCLD - (American Society of Crime Laboratory Directors), common operating systems and platforms used.
What items should your business plan include?
Justification, budget development, approval and acquisition, implementation.
two popular certification systems for computer forensics.
ACE - (AccessData Certified Examiner), HTCN - (High-Tech Crime Network)
The National Cybercrime Training Partnership is available only to law enforcement.
True
Why is physical security so critical for computer forensics labs?
Integrity of the evidence.
If a visitor to your computer forensics lab is a personal friend, it's not necessary to have him or her sign the visitor's log.
False
What three items should you research before ening in a certification program?
requirements, cost, and acceptability in your chosen area of employment.
Large computer forensics labs should have at least _____ exits.
Two
Typically, a(n) _______ lab has a separate storage area or room for evidence.
Forensics
Computer forensics facilities always have windows.
False
The chief custodian of evidence storage containers should keep several master keys.
True
Putting out fires in a computer lab usually requires a ______ rated fire extinguisher.
ABC Fire Extinguisher
A forensic workstation should always have a direct broadband connection to the Internet.
False
Which organization provides good information on safe storage containers?
NISPOM - (National Industrial Security Program Operating Manual)
Which organization has guidelines on how to operate a computer forensics lab?
ASCLD
What term refers to labs constructed to shield EMR emissions?
TEMPEST
Please allow access to your computer’s microphone to use Voice Recording.
We can’t access your microphone!
Click the icon above to update your browser permissions above and try again
Example:
Reload the page to try again!
Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or
install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Chapter 3 (The Investigator’s Office and Laboratory)Review Questions1.To determine the types of operating systems needed in your lab, list twosources of information you could use.
Get answer to your question and much more
2.What items should your business plan include?
Get answer to your question and much more
3.List two popular certification systems for computer forensics.
Get answer to your question and much more
4.Why is physical security so critical for computer forensics labs?
Get answer to your question and much more