Chapter 2 SCIA 470

25 July 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
​A TEMPEST facility is designed to accomplish which of the following goals? a. prevent data loss by maintaining consistent backups b. shield sensitive computing systems and prevent electronic eavesdropping of computer emission c. ensure network security from the internet using comprehensive security software d. protect the integrity of data
answer
b (shield sensitive computing systems and prevent electronic eavesdropping of computer emission)
question
​Candidates who complete the IACIS test successfully are designated as a _______.
answer
certified forensic computer examiner (CFCE)
question
​How often should hardware be replaced within a forensics lab?
answer
every 12 to 18 months
question
​In order to qualify for the Advanced Certified Computer Forensic Technician certification, a candidate must have _______ years of hands-on experience in computer forensics investigations.
answer
five
question
​In order to qualify for the Certified Computer Forensic Technician, Basic Level certification, how many hours of computer forensics training are required?
answer
40
question
​What certification program, sponsored by ISC2, requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations?
answer
certified cyber forensics professional
question
​What percentage of consumers utilize Intel and AMD PCs?
answer
90
question
Which option below is not a recommendation for securing storage containers? a. the container should be located in a restricted area b. only authorized access should be allowed, and it should be kept to a minimum c, evidence containers should remain locked when they aren't under direct supervision d. rooms with evidence containers should have a secured wireless network
answer
d (rooms with evidence containers should have a secured wireless network)
question
How long are computing components designed to last in a normal business environment?​
answer
18 to 36 months
question
In order to qualify for the Certified Computer Crime Investigator, Basic Level certification, candidates must provide documentation of at least _______ cases in which they participated.​
answer
10
question
Which ISO standard below is followed by the ASCLD?
answer
ISO17025:2005
question
Which file system below is utilized by the Xbox gaming system?​
answer
FATX
question
Which of the following scenarios should be covered in a disaster recovery plan? a. damage caused by lightning strikes b. damage caused by flood c. damage caused by a virus contamination d. all of the above
answer
d (all of the above)
question
Which operating system listed below is not a distribution of the Linux OS? a. minix b. debian c. slackwar d. fedora
answer
a. minix
question
Which option below is not one of the recommended practices for maintaining a keyed padlock?
answer
use master key
question
Which tool below is not recommended for use in a forensics lab?​
answer
degusser
question
_______ can be used to restore backup files directly to a workstation.
answer
Norton Ghost
question
_______ describes the characteristics of a safe storage container.
answer
NISPOM
question
_______ is a specialized viewer software program.
answer
irfanview
question
_______ is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence.​
answer
the lab manager