The Distributed Network Attach Tool is used by computer forensic specialists to monitor potential hacking carried out over the Internet.
The Distributed Network Attach Tool is used by computer forensic specialists to _____.
Responses
replace a hard drive that has crashed
replace a hard drive that has crashed
identify fraudulent bank and accounting records on a computer
identify fraudulent bank and accounting records on a computer
find data on a CD-ROM drive
find data on a CD-ROM drive
monitor potential hacking carried out over the Internet
9 answers
Responses
must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court
must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court
must have every piece of data studied in files with current dates and updated tags
must have every piece of data studied in files with current dates and updated tags
have little in common
have little in common
must follow different guidelines and protocol
Protocol at a crime-scene investigation and during the investigation of a computer must follow the chain of custody and investigation protocol in order for the evidence to be admissible in court.
Responses
latent phase
latent phase
ad-hoc phase
ad-hoc phase
enterprise phase
enterprise phase
structured phase
structured phase
The enterprise phase is the more advanced stage of computer forensics which now utilizes a structured protocol of evidence collection.
Responses
1980s
1980s
1960s
1960s
1970s
1970s
1990s
1990s
Computer crime first appeared in the 1970s.
Responses
catch the criminal
catch the criminal
keep the crime from happening again
keep the crime from happening again
present accurate, admissible evidence to the court
present accurate, admissible evidence to the court
get all the information back
get all the information back
The primary goal of a forensic computer investigator is to present accurate, admissible evidence to the court.