Upgrade to remove ads
Only SGD 41.99/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (60)
When cases go to trial, you as a forensics examiner can play one of ____ roles.
2
When you give ____ testimony, you present this evidence and explain what it is and how it was obtained.
technical/scientific
Validate your tools and verify your evidence with ____ to ensure its integrity.
hash algorithms
For forensics examiner, keeping the ____ updated and complete is crucial to supporting your role as an expert and showing that you're constantly enhancing your skills through training, teaching, and experience.
CV
If your CV is more than ____ old, you probably need to update it to reflect new cases and additional training.
3 months
____ is a written list of objections to certain testimony or exhibits.
motion in limine
Regarding a trial, the term ____ means rejecting potential jurors.
strikes
____ from both the plaintiff's and defense's attorneys is an optional phase of the trial. Generally, it's allowed to cover an issue raised during cross-examination of a witness.
Rebuttal
If a microphone is present during your testimony, place it ____ to eight inches from you.
6
Jurors typically average just over ____ years of education and an eighth-grade reading level.
12
____ is an attempt by opposing attorneys to prevent you from serving on an important case
conflicting out
____ evidence is evidence that exonerates or diminishes the defendant's liability.
exculpatory
You provide ____ testimony when you answer questions from the attorney who hired you.
direct
The ____ is the most important part of testimony at a trial.
direct examination
Generally, the best approach your attorney can take in direct examination is to ask you ____ questions and let you give your testimony.
open ended
Leading questions such as "Isn't it true that forensics experts always destroy their handwritten notes?" are referred to as ____ questions.
set up
Sometimes opposing attorneys ask several questions inside one question; this practice is called a ____ question.
compound
A ____ differs from a trial testimony because there is no jury or judge.
deposition
There are two types of depositions: ____ and testimony preservation.
discovery
Discuss any potential problems with your attorney ____ a deposition.
before
The opposing attorney sets the deposition and often conducts the equivalent of both direct and cross-examination. A discovery deposition is considered part of the discovery process.
discovery deposition
The practice of opposing attorneys trying to prevent you from testifying by claiming you have discussed the case with them and, therefore, have a conflict of interest.
conflicting out
A deposition held to preserve your testimony in case of schedule conflicts or health problems; it's usually video recorded in addition to the written transcript.
testimony preservation deposition
A pretrial motion to exclude or limit the use of certain evidence because its potential to prejudice the jury would exceed its probative value.
motion in limine
This type of testimony reports only the facts (findings of an investigation); no opinion is given in court.
fact witness
In this qualification phase of testimony, your attorney asks you questions to elicit the qualifications that make you an expert witness.
voir dire
Give the opposing counsel a chance to preview your testimony before trial.
deposition
An extensive outline of your professional history that includes education, training, work, and what cases you have worked o as well as training you have conducted or contributed to.
curriculum Vitae (CV)
This type of testimony reports opinions based on experience and facts gathered during an investigation.
expert witness
Statements that organize the evidence and state the applicable law.
closing argument
____ increases the time and resources needed to extract, analyze, and present evidence.
scope creep
You begin a digital forensics case by creating a(n) ____.
investigation plan
In civil and criminal cases, the scope is often defined by search warrants or ____, which specify what data you can recover.
subpoenas
To enhance searching for and eliminating known OS and application files, Autopsy has an indexed version of the NIST ____ of MD5 hashes.
NSRL
____ have some limitations in performing hashing, however, so using advanced ____ is necessary to ensure data integrity.
Digital forensics tools, hexadecimal editors
AccessData ____ compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data.
KFF
Data ____ involves changing or manipulating a file to conceal information.
hiding
One way to hide partitions is with the Windows disk partition utility, ____.
diskpart
Marking bad clusters data-hiding technique is more common with ____ file systems.
FAT
The term ____ comes from the Greek word for "hidden writing."
steganography
____ is defined as hiding messages in such a way that only the intended recipient knows the message is there.
steganography
Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.
key escrow
People who want to hide data can also use advanced encryption programs, such as PGP or ____.
BestCrypt
____ recovery is becoming more common in digital forensic analysis.
Password
____ attacks use every possible letter, number, and character found on a keyboard when cracking a password.
Brute-force
Many password-protected OSs and applications store passwords in the form of ____ or SHA hash values.
MD5
____ alters hash values, which makes cracking passwords more difficult.
Salting passwords
Defines the investigation's goal and scope, the materials needed, and the tasks to perform
investigation plan
The converted cover-media file that stores the hidden message
stage-media
One of the most critical aspects of computer forensics
validating digital evidence
The original file with no hidden message
cover media
Designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure
salting passwords
A password recovery program available from AccessData
PRTK
Progressing to make any current encryption schemes obsolete
quantum computing
Program used to clean all data from the target drive you plan to use
digital intelligence PDWipe
Limit a civil investigation
court orders for discovery
A file containing the hash values for every possible password that can be generated from a computer's keyboard
rainbow table
Criminal investigations are limited to finding data defined in the search ____.
warrant
The data-hiding technique ____ changes data from readable code to data that looks like binary executable code.
bit-shifting
WinHex provides several hashing algorithms, such as MD5 and ____.
SHA-1
Sets with similar termsCS 305 Final
46 terms
dmcmeekan9
CyberOps SecOps: Section 5 Event correlation and n…
31 terms
dpAdam
Forensics - Chapters 3/14
35 terms
jinxz1103
Digital Forensics
81 terms
emmkay_
Verified questionsADVANCED MATH
You decide you wish to build your dream home in the woods. You must borrow $\$ 250,000$. One bank offers you a 30 -year loan at a rate of $7.5 \%$. Another bank offers you a 15 -year loan at a rate of only $7 \%$. Given that each bank would expect monthly installments of equal payments, how much would the monthly payments be for each loan? How much would you end up paying (in total after the loan is completely repaid) with each of the two offers?
Verified answer
ADVANCED MATH
Bloomington Breweries produces beer and ale. Beer sells for $5 per band, and ale sells for$2 per barrel. Producing a barrel of beer requires 5 lb of corn and 2 lb of hops. Producing a barrel of ale require? 2 lb of corn and 1 lb of hops. Sixty pounds of corn and 25 lb of hops are available Formulate an LP that can be used to maximize revenue. Solve the LP graphically.
Verified answer
ADVANCED MATH
Scott, Arif, and Diane run a small delivery company. For their business, they use licensed two-way radios with a 20-km range. Scott is at their office, which they have marked as the origin on their map of the town. The grid lines on the map are spaced 1 km apart. Arif is dropping off a package at (-8, 16) while Diane is making a pick-up at (4, 20). a) Draw a diagram to represent the reception range for the radio at the office. b) Find an equation that describes the boundary of this area. c) Are Arif and Diane both within range of the radio at the office? Justify your answer. d) Are Arif and Diane within radio range of each other? Justify your answer.
Verified answer
ADVANCED MATH
A rectangular floor is covered with identical square tiles. The floor is 40 tiles long and 30 tiles wide. If a straight line is drawn across the floor from corner to corner, how may tiles will it cross?
Verified answer
Recommended textbook solutionsBook of Proof
2nd EditionRichard Hammack
340 solutions
Numerical Analysis
9th EditionJ. Douglas Faires, Richard L. Burden
873 solutions
Elementary Number Theory
7th EditionDavid Burton
776 solutions
Topology
2nd EditionJames Munkres
622 solutions
Other Quizlet setsIntroduction to public Speaking- Exam 2
36 terms
brennanmoll
6600: Measurement
90 terms
preytorion8
Chapter 3: Speech Ethics
27 terms
iknow1
CH 19 Forensics Quiz
35 terms
mgkoll
Related questionsQUESTION
Which general ledger document tracks the amount of money that a customer owes for the goods received by the customer?
2 answers
QUESTION
For most software programs, the licensing agreement or terms of use agreement is usually displayed and must be agreed to by the end user at the beginning of the software installation.
15 answers
QUESTION
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data. (T or F)
15 answers
QUESTION
WiFi networks, clickers, Bluetooth headsets, cordless telephones, and microwave ovens all operate in the same 2.4GHz ISM frequency range. Operating these devices in close proximity might result in what problem?
15 answers