In which type of testimony does the investigator present evidence and explain what it is and how it was obtained quizlet?

Upgrade to remove ads

Only SGD 41.99/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (60)

When cases go to trial, you as a forensics examiner can play one of ____ roles.

2

When you give ____ testimony, you present this evidence and explain what it is and how it was obtained.

technical/scientific

Validate your tools and verify your evidence with ____ to ensure its integrity.

hash algorithms

For forensics examiner, keeping the ____ updated and complete is crucial to supporting your role as an expert and showing that you're constantly enhancing your skills through training, teaching, and experience.

CV

If your CV is more than ____ old, you probably need to update it to reflect new cases and additional training.

3 months

____ is a written list of objections to certain testimony or exhibits.

motion in limine

Regarding a trial, the term ____ means rejecting potential jurors.

strikes

____ from both the plaintiff's and defense's attorneys is an optional phase of the trial. Generally, it's allowed to cover an issue raised during cross-examination of a witness.

Rebuttal

If a microphone is present during your testimony, place it ____ to eight inches from you.

6

Jurors typically average just over ____ years of education and an eighth-grade reading level.

12

____ is an attempt by opposing attorneys to prevent you from serving on an important case

conflicting out

____ evidence is evidence that exonerates or diminishes the defendant's liability.

exculpatory

You provide ____ testimony when you answer questions from the attorney who hired you.

direct

The ____ is the most important part of testimony at a trial.

direct examination

Generally, the best approach your attorney can take in direct examination is to ask you ____ questions and let you give your testimony.

open ended

Leading questions such as "Isn't it true that forensics experts always destroy their handwritten notes?" are referred to as ____ questions.

set up

Sometimes opposing attorneys ask several questions inside one question; this practice is called a ____ question.

compound

A ____ differs from a trial testimony because there is no jury or judge.

deposition

There are two types of depositions: ____ and testimony preservation.

discovery

Discuss any potential problems with your attorney ____ a deposition.

before

The opposing attorney sets the deposition and often conducts the equivalent of both direct and cross-examination. A discovery deposition is considered part of the discovery process.

discovery deposition

The practice of opposing attorneys trying to prevent you from testifying by claiming you have discussed the case with them and, therefore, have a conflict of interest.

conflicting out

A deposition held to preserve your testimony in case of schedule conflicts or health problems; it's usually video recorded in addition to the written transcript.

testimony preservation deposition

A pretrial motion to exclude or limit the use of certain evidence because its potential to prejudice the jury would exceed its probative value.

motion in limine

This type of testimony reports only the facts (findings of an investigation); no opinion is given in court.

fact witness

In this qualification phase of testimony, your attorney asks you questions to elicit the qualifications that make you an expert witness.

voir dire

Give the opposing counsel a chance to preview your testimony before trial.

deposition

An extensive outline of your professional history that includes education, training, work, and what cases you have worked o as well as training you have conducted or contributed to.

curriculum Vitae (CV)

This type of testimony reports opinions based on experience and facts gathered during an investigation.

expert witness

Statements that organize the evidence and state the applicable law.

closing argument

____ increases the time and resources needed to extract, analyze, and present evidence.

scope creep

You begin a digital forensics case by creating a(n) ____.

investigation plan

In civil and criminal cases, the scope is often defined by search warrants or ____, which specify what data you can recover.

subpoenas

To enhance searching for and eliminating known OS and application files, Autopsy has an indexed version of the NIST ____ of MD5 hashes.

NSRL

____ have some limitations in performing hashing, however, so using advanced ____ is necessary to ensure data integrity.

Digital forensics tools, hexadecimal editors

AccessData ____ compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data.

KFF

Data ____ involves changing or manipulating a file to conceal information.

hiding

One way to hide partitions is with the Windows disk partition utility, ____.

diskpart

Marking bad clusters data-hiding technique is more common with ____ file systems.

FAT

The term ____ comes from the Greek word for "hidden writing."

steganography

____ is defined as hiding messages in such a way that only the intended recipient knows the message is there.

steganography

Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.

key escrow

People who want to hide data can also use advanced encryption programs, such as PGP or ____.

BestCrypt

____ recovery is becoming more common in digital forensic analysis.

Password

____ attacks use every possible letter, number, and character found on a keyboard when cracking a password.

Brute-force

Many password-protected OSs and applications store passwords in the form of ____ or SHA hash values.

MD5

____ alters hash values, which makes cracking passwords more difficult.

Salting passwords

Defines the investigation's goal and scope, the materials needed, and the tasks to perform

investigation plan

The converted cover-media file that stores the hidden message

stage-media

One of the most critical aspects of computer forensics

validating digital evidence

The original file with no hidden message

cover media

Designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure

salting passwords

A password recovery program available from AccessData

PRTK

Progressing to make any current encryption schemes obsolete

quantum computing

Program used to clean all data from the target drive you plan to use

digital intelligence PDWipe

Limit a civil investigation

court orders for discovery

A file containing the hash values for every possible password that can be generated from a computer's keyboard

rainbow table

Criminal investigations are limited to finding data defined in the search ____.

warrant

The data-hiding technique ____ changes data from readable code to data that looks like binary executable code.

bit-shifting

WinHex provides several hashing algorithms, such as MD5 and ____.

SHA-1

Sets with similar terms

CS 305 Final

46 terms

dmcmeekan9

CyberOps SecOps: Section 5 Event correlation and n…

31 terms

dpAdam

Forensics - Chapters 3/14

35 terms

jinxz1103

Digital Forensics

81 terms

emmkay_

Verified questions

ADVANCED MATH

You decide you wish to build your dream home in the woods. You must borrow $\$ 250,000$. One bank offers you a 30 -year loan at a rate of $7.5 \%$. Another bank offers you a 15 -year loan at a rate of only $7 \%$. Given that each bank would expect monthly installments of equal payments, how much would the monthly payments be for each loan? How much would you end up paying (in total after the loan is completely repaid) with each of the two offers?

Verified answer

ADVANCED MATH

Bloomington Breweries produces beer and ale. Beer sells for $5 per band, and ale sells for$2 per barrel. Producing a barrel of beer requires 5 lb of corn and 2 lb of hops. Producing a barrel of ale require? 2 lb of corn and 1 lb of hops. Sixty pounds of corn and 25 lb of hops are available Formulate an LP that can be used to maximize revenue. Solve the LP graphically.

Verified answer

ADVANCED MATH

Scott, Arif, and Diane run a small delivery company. For their business, they use licensed two-way radios with a 20-km range. Scott is at their office, which they have marked as the origin on their map of the town. The grid lines on the map are spaced 1 km apart. Arif is dropping off a package at (-8, 16) while Diane is making a pick-up at (4, 20). a) Draw a diagram to represent the reception range for the radio at the office. b) Find an equation that describes the boundary of this area. c) Are Arif and Diane both within range of the radio at the office? Justify your answer. d) Are Arif and Diane within radio range of each other? Justify your answer.

Verified answer

ADVANCED MATH

A rectangular floor is covered with identical square tiles. The floor is 40 tiles long and 30 tiles wide. If a straight line is drawn across the floor from corner to corner, how may tiles will it cross?

Verified answer

Recommended textbook solutions

In which type of testimony does the investigator present evidence and explain what it is and how it was obtained quizlet?

Book of Proof

2nd EditionRichard Hammack

340 solutions

In which type of testimony does the investigator present evidence and explain what it is and how it was obtained quizlet?

Numerical Analysis

9th EditionJ. Douglas Faires, Richard L. Burden

873 solutions

In which type of testimony does the investigator present evidence and explain what it is and how it was obtained quizlet?

Elementary Number Theory

7th EditionDavid Burton

776 solutions

In which type of testimony does the investigator present evidence and explain what it is and how it was obtained quizlet?

Topology

2nd EditionJames Munkres

622 solutions

Other Quizlet sets

Introduction to public Speaking- Exam 2

36 terms

brennanmoll

6600: Measurement

90 terms

preytorion8

Chapter 3: Speech Ethics

27 terms

iknow1

CH 19 Forensics Quiz

35 terms

mgkoll

Related questions

QUESTION

Which general ledger document tracks the amount of money that a customer owes for the goods received by the customer?

2 answers

QUESTION

For most software programs, the licensing agreement or terms of use agreement is usually displayed and must be agreed to by the end user at the beginning of the software installation.

15 answers

QUESTION

Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data. (T or F)

15 answers

QUESTION

WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens all operate in the same 2.4GHz ISM frequency range. Operating these devices in close proximity might result in what problem?

15 answers

What should you use to verify evidence and thus ensure its integrity quizlet?

To protect or ensure the integrity of collected digital evidence, an investigator should create a checksum using a hashing algorithm. In the future, the same hashing algorithm can be used to create another checksum.

When writing a report style means the tone of language you use to address the reader?

When writing a report, style means the tone of language you use to address the reader. if you must write a preliminary report, use words such as preliminary copy, draft copy, or working draft.

What are some risks of using tools you have created yourself?

What are some risks of using tools you have created yourself?.
Don't present false data or alter data..
Don't report work that was not done..
Don't ignore available contradictory data..
Don't ignore available contradictory data..
Don't do work beyond your expertise or competence..