When transporting evidence from one location to another: Show
o Properly log all evidence in and out of controlled storage. o Use proper packing techniques, such as static-free bags, foam packing material, and cardboard boxes. o Maintain custody of evidence. o Make sure the evidence is not tampered or damaged. focusNode Didn't know it? Knew it? Embed Code - If you would like this activity on your web page, copy the script below and paste it into
your web page. Chapters 1-7
What are the five required functions for computer forensics tools?Computer Forensics Evidence and capture: Data Recovery Defined-Data Back-up and Recovery-The Role of Back -up in Data Recovery-The Data -Recovery Solution. Evidence Collection and Data Seizure: Why Collect Evidence?
When validating the results of a forensics analysis you should do which of the following?When validating the results of a forensic analysis, you should do which of the following? Calculate the hash value with two different tools. Repeat the steps used to obtain the digital evidence, using the same tool, and recalculate the hash value to verify the results.
What is one of the first steps in a computer forensic investigation according to the FBI?The first step in any computer forensic investigation is to make a copy of the suspected storage device.
What is the purpose of maintaining a network of computer forensics specialists?The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas different from your own specialties in case you need help on an investigation.
|