IISFA
II0-001
Q1:
Clues that a "Received:" header has been forged include all but one of the following:
○
A
Invalid IP address○
B
Invalid host names○
C
Invalid Subject line○
D
Invalid format
IISFA
II0-001
Q2:
There are several types of evidence that can be used in a trial. Which type of evidence listed below provides the most reliability?
○
A
Testimonial Evidence○
B
Hearsay evidence○
C
Best evidence○
D
Direct evidence
IISFA
II0-001
Q3:
What prohibits the government from performing unreasonable searches without having probable cause?
○
A
Corporate or Company policies○
B
Fourth Amendment○
C
Computer Fraud and Abuse Act○
D
Federal Privacy Act of 1974
IISFA
II0-001
Q4:
The process of evidence handling, protection of the evidence and providing accountability for who handled the evidence during the investigation is referred to as what?
○
A
Hearsay○
B
Investigators log○
C
Chain of custody○
D
Rule of best evidence
IISFA
II0-001
Q5:
After a forensics investigator seizes and transports the computer, what is the next step?
○
A
Lock the evidence in a safe○
B
Make an image copy of the storage media (hard drive, CD, diskettes)○
C
Dust the evidence for fingerprints○
D
Label and place it into a container and label the container