1. In a computer forensics investigation, describe the route that evidence takes from the time you find it until the case is closed or goes to court.
Rules of evidence
Law of probability
Chain of custody
Policy of separation
2. If the computer is turned on when you arrive, what does the Secret Service recommend you do?
Begin your investigation immediately.
Shut down according to recommended Secret Service procedure.
Transport the computer with power on.
Unplug the machine immediately.
3. Why should you note all cable connections for a computer you want to seize as evidence?
To know what outside connections existed
In case other devices were connected
To know what peripheral devices existed
To know what hardware existed
4. What is the essence of the Daubert standard?
That only experts can testify at trial
That an expert must affirm that a tool or technique is valid
That only tools or techniques that have been accepted by the scientific community are admissible at trial
That the chain of custody must be preserved
5. When cataloging digital evidence, the primary goal is to do what?
Make bitstream images of all hard drives.
Preserve evidence integrity.
Keep evidence from being removed from the scene.
Keep the computer from being turned off.
6. Which of the following is important to the investigator regarding logging?
The logging methods
Log retention
Location of stored logs
All of the above
7. Your roommate can give consent to search your computer.
True
False
8. Evidence need not be locked if it is at a police station.
True
False
9. You are investigating a breach of a file server that resulted in several stolen files. Which federal law is most likely to apply?
18 U.S.C. § 1028A, Identity Theft and Aggravated Identity Theft
18 U.S.C. § 1030, Fraud and Related Activity in Connection with Computers
The USA Patriot Act
The Telecommunications Act of 1996