Review Questions


  1. What are two general ways in which computers are involved in security violations?

  2. What is computer evidence?

  3. What is an incident response team?

  4. What is real evidence?

  5. What is documentary evidence?

  6. What is demonstrative evidence?

  7. What is a subpoena?

  8. What is a search warrant ?

  9. What is the chain of custody?

  10. What is admissible evidence?




Computer Forensics JumpStart
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net