1. expert report: A formal document prepared by a forensics specialist to document an investigation, including a list of all tests conducted as well as the
specialist's own curriculum vitae (CV).Anything the specialist plans to testify about
at a trial must be included in the expert report.
2. Testimonial evidence: Information that forensic specialists use to support or
interpret real or documentary evidence; for example, to demonstrate that the
fingerprints found on a keyboard are those of a specific individual.
3. Daubert standard: The standard holding that only methods and tools widely
accepted in the scientific community can be used in court.
4. If the computer is turned on when you arrive, what does the Secret Service
recommend you do?: Shut down according to the recommended Secret Service
procedure.
5. Communications Assistance to Law Enforcement Act of 1994: The Communications Assistance to Law Enforcement Act of 1994 is a federal wiretap law
for traditional wired telephony. It was expanded to include wireless, voice over
packet, and other forms of electronic communications, including signaling traffic
and metadata.
6. Digital evidence: Digital evidence is information processed and assembled so
that it is relevant to an investigation and supports a specific finding or determination.
7. Federal Privacy Act of 1974: The Federal Privacy Act of 1974, a United States
federal law that establishes a code of Fair Information Practice that governs the
collection, maintenance, use, and dissemination of information about individuals
that is maintained in systems of records by U.S. federal agencies.
8. Power Spy,Verity, ICU, and WorkTime: Spyware
9. good fictitious e-mail response rate: 1-3. Which crime is most likely to leave e-mail evidence?: Cyberstalking
11. Where would you seek evidence that ophcrack had been used on a
Windows Server 2008 machine?: In the logs of the server; look for the reboot
of the system
12. A SYN flood is an example of what?: DoS attack
13. definition of a virus, in relation to a computer?: a type of malware that
requires a host program or human help to propagate
14. What is the starting point for investigating the denial of service attacks?-
: Tracing the packets
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |