What is the term used to describe how this evidence is admissible?
Law enforcement officers are conducting a legal search for which a valid warrant was obtaineD.
While conducting the search, officers observe an item of evidence for an unrelated crime that was
not included in the warrant. The item was clearly visible to the officers and immediately identified
as evidence. What is the term used to describe how this evidence is admissible?
you need to make to ensure that the evidence found is complete and admissible in future proceedings?
You are working as an independent computer forensics investigator and receive a call from a
systems administrator for a local school system requesting your assistance. One of the students at
the local high school is suspected of downloading inappropriate images from the Internet to a PC
in the Computer laB. When you arrive at the school, the systems administrator hands you a hard
drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this
drive and requests that you examine that drive for evidence of the suspected images. You inform
him that a simple backup copy will not provide deleted files or recover file fragments. What type of
copy do you need to make to ensure that the evidence found is complete and admissible in future
proceedings?
What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those s
You are assisting in the investigation of a possible Web Server Hack. The company who called
you stated that customers reported to them that whenever they entered the web address of the
company in their browser, what they received was a porno graphic web site. The company
checked the web server and nothing appears wrong. When you type in the IP address of the web
site in your browser everything appears normal. What is the name of the attack that affects the
DNS cache of the name resolution servers, resulting in those servers directing users to the wrong
web site?
What assistance can the ISP provide?
In conducting a computer abuse investigation you become aware that the suspect of the
investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and
request that they provide you assistance with your investigation. What assistance can the ISP
provide?
which of the following is the most important to your professional reputation?
As a CHFI professional, which of the following is the most important to your professional
reputation?
Which of the following tools would allow you to quickly and efficiently search for a string within a file on t
You are conducting an investigation of fraudulent claims in an insurance company that involves
complex text searches through large numbers of documents. Which of the following tools would
allow you to quickly and efficiently search for a string within a file on the bitmap image of the target
computer?
When cataloging digital evidence, the primary goal is to:
When cataloging digital evidence, the primary goal is to:
What is preventing the police from breaking down the suspects door and searching his home and seizing all of h
The police believe that Mevin Mattew has been obtaining unauthorized access to computers
belonging to numerous computer software and computer operating systems manufacturers,
cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They
also suspect that he has been stealing, copying and misappropriating proprietary computer
software belonging to the several victim companies. What is preventing the police from breaking
down the suspects door and searching his home and seizing all of his computer equipment if they
have not yet obtained a warrant?
A law enforcement officer may only search for and seize criminal evidence with _____________…
A law enforcement officer may only search for and seize criminal evidence with _____________,
which are facts or circumstances that would lead a reasonable person to believe a crime has
been committed or is about to be committed, evidence of the specific crime exists and the
evidence of the specific crime exists at the place to be searcheD.
You inform the officer that you will not be able to comply with that request because doing so would:
You are working as a Computer forensics investigator for a corporation on a computer abuse
case. You discover evidence that shows the subject of your investigation is also embezzling
money from the company. The company CEO and the corporate legal counsel advise you to
contact law enforcement and provide them with the evidence that you have founD. The law
enforcement officer that responds requests that you put a network sniffer on your network and
monitor all traffic to the subjects computer. You inform the officer that you will not be able to
comply with that request because doing so would: