

![]()


Information Security is a comprehensive course that introduces students to the fundamental principles and practices of protecting information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The course covers essential topics such as cryptography, risk assessment, access control, network security, security policies, and legal and ethical issues related to information security. Students will gain practical skills in identifying vulnerabilities, implementing security measures, and developing strategies for safeguarding data and maintaining system integrity in both organizational and individual contexts. This course prepares students for emerging challenges in the digital world and equips them with the knowledge needed to ensure the confidentiality, integrity, and availability of information assets.
Recommended Textbook
Computer Forensics Principles and Practices 1st Edition by Linda Volonino
Available Study Resources on Quizplus
13 Chapters
600 Verified Questions
600 Flashcards
Source URL: https://quizplus.com/study-set/2159 Page 2

Available Study Resources on Quizplus for this Chatper
33 Verified Questions
33 Flashcards
Source URL: https://quizplus.com/quiz/43035
Sample Questions
Q1) Crimes against computers can include which of the following?
A)Attacks on networks
B)Unauthorized access
C)Tampering with data
D)All the above
Answer: D
Q2) Based on preliminary evidence obtained at the start of an investigation,an investigator may form a(n)________ about what happened.
Answer: theory
Q3) ________ evidence is that type that could incorrectly lead an investigator to believe the evidence is related to the crime.
Answer: Artifact
Q4) Proper collection of evidence and handling procedures must be followed to ensure the evidence is ________.
Answer: admissible
Q5) Only ________ evidence supports or helps confirm a given theory.
Answer: inculpatory
Q6) ________ charges are those brought by a person or company.
Answer: Civil
To view all questions and flashcards with answers, click on the resource link above. Page 3

Available Study Resources on Quizplus for this Chatper
28 Verified Questions
28 Flashcards
Source URL: https://quizplus.com/quiz/43036
Sample Questions
Q1) Which of the following is NOT considered one of the five stages of a computer investigation?
A)Intelligence
B)Hypothesis
C)Conviction
D)Conclusion
Answer: C
Q2) A(n)________ is a reasonable belief that a person has committed a crime.
Answer: probable cause
Q3) What unique piece of evidence finally gave police the break they'd needed in order to solve the BTK serial murderer case?
A)A phone number located within a computer
B)A USB drive with his deleted address
C)A floppy disk with his deleted address
D)A floppy disk with a deleted address of a church
Answer: D
Q4) ________ is a term generally used to indicate a message is hidden within another file.
Answer: Steganography
To view all questions and flashcards with answers, click on the resource link above. Page 4

Available Study Resources on Quizplus for this Chatper
48 Verified Questions
48 Flashcards
Source URL: https://quizplus.com/quiz/43037
Sample Questions
Q1) Write blocker
A) Unique digital signature of data
B) Additional sectors created to fill a cluster
C) Application that prevents changes to a hard drive
D) Captures a "snapshot" of everything on the drive
E) Mathematical computations that validate a copy
Answer: C
Q2) Hidden data
A) A file renamed to look like an operating system file
B) Data easily viewed through file manager programs
C) Cache files and history files
D) File space that is now available for being written to
Answer: A
Q3) ________,from Paraben Forensics,is a comprehensive tool for investigating the contents of Palm Pocket PCs that run on Windows CE.
Answer: PDA Seizure
Q4) When a copy is made,the contents of a hard drive are stored as a series of compressed ________ files.
Answer: image
To view all questions and flashcards with answers, click on the resource link above. Page 5
Available Study Resources on Quizplus for this Chatper
63 Verified Questions
63 Flashcards
Source URL: https://quizplus.com/quiz/43038
Sample Questions
Q1) If you encounter files that have been password protected,one option is to
A)Ask the user to give you the password
B)Reconfigure the BIOS to allow access to the file
C)Try a number of standard passwords to try to find a match
D)Consult a hacker site for help with the password
Q2) With the original evidence safely stored,you should make a(n)________ of the forensic image.
Q3) A(n)________ examination involves searches of the areas the operating system does not recognize as being normally used.
Q4) Bootable media
A)Useful for transferring large amounts of data or images
B)Necessary if there are no convenient plugs
C)Startup disks, CDs, or USB drives
D)Used to keep notes or upload photographs
E)Screwdrivers, pliers, duct tape
Q5) Common criteria for accepting a case include all of the following EXCEPT
A)Whether it is a criminal or civil case
B)The law enforcement agency in charge of the case
C)The potential impact upon the organization
D)Liability issues

Page 6
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/43039
Sample Questions
Q1) Most recent ZIP drives can handle up to what amount of data?
A)500GB
B)1GB
C)750MB
D)120MB
Q2) If a PDA is off at the time it is seized,it should be
A)Switched on
B)Attached to the forensic examiner platform
C)Left off
D)Plugged into the nearest power strip
Q3) ________ media use light from laser or LED sources to determine 0s and 1s.
Q4) Guidance software
A)Considered to be the gold standard
B)Highly regarded and able to generate detailed reports
C)Considered most reliable for hardware
D)Has Faraday bags
Q5) The simple rule for powering down equipment is that you pull the plug on everything but ________.
Q6) To understand how hardware works,you must understand the ________ of how drives store 0s and 1s.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/43040
Sample Questions
Q1) The OSI model has ________ layers.
Q2) The set of rules that govern how commands are entered into DOS is called
Q3) FAT 16
A)Has an upper limit of \( 4 \mathrm{~GB} \) for file size
B)Has an upper limit of \( 2 \mathrm{~GB} \) for file size
C)Resembles a phone book
D)Lists other files and directories
Q4) The two main components of a FAT file system are the
A)file directory and root directory
B)file allocation table and root directory
C)root directory table and file allocation directory
D)file database and superuser directory
Q5) The Windows NT kernel operates in a protected method called ________ mode.
Q6) The Windows 95 ________ feature automated the installation of hardware.
Q7) Internet
A)Uses IP as its transmission protocol
B)The reliability layer
C)Handles physical aspects of a network
D)Routes packets over a network Page 8
To view all questions and flashcards with answers, click on the resource link above.
Page 9

Available Study Resources on Quizplus for this Chatper
57 Verified Questions
57 Flashcards
Source URL: https://quizplus.com/quiz/43041
Sample Questions
Q1) HKEY_USERS Default
A)Default
B)System
C)SAM
D)Software
Q2) Inodes
A)Contain metadata for each file
B)Unit of allocation for storage
C)Created for every file system mounted
D)Contains information about the directory structure
Q3) ________ are used to determine where data starts and ends when graphic files are located in unallocated or slack space.
Q4) Data block
A)Contain metadata for each file
B)Unit of allocation for storage
C)Created for every file system mounted
D)Contains information about the directory structure
Q5) A(n)________ is designed as a hierarchical listing of folders and files.
Q6) Files are first loaded into a(n)________ before being printed.
Q7) A(n)________ is created by the computer for each user.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
47 Verified Questions
47 Flashcards
Source URL: https://quizplus.com/quiz/43042
Sample Questions
Q1) Which of the following file extensions would most likely be found in an e-mail search for someone using Outlook?
A).eml
B).wab
C).dbx
D).mbx
Q2) Which RAID array uses a minimum of three disks,two for striping and one to store parity information?
A)RAID 9
B)RAID 5
C)RAID 3
D)RAID 1
Q3) The ________ comes before the @ sign in an e-mail address
Q4) Which of the following is NOT a webmail program?
A)Yahoo!Mail
B)Hotmail
C)LotusMail
D)Gmail
Q5) ________ uses two or more hard drives accessed in parallel to create a pool of storage.
11
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
39 Verified Questions
39 Flashcards
Source URL: https://quizplus.com/quiz/43043
Q1) The ________ is a major source of forensic data in both the stand-alone and network forensic fields.
Q2) Software clients called ________ installed on network devices are designed to collect information from the host.
Q3) The NFAT software usually contains a query language such as A)IMS
B)IIS
C)SQL
D)PHP
Q4) A problem that can occur with IDS alerts is ________,when an IDS mistakenly flags an innocent file as being suspicious.
Q5) Identifying situations such as regular spikes in late-night traffic is an example of A)Pattern analysis
B)Content analysis
C)Playback analysis
D)Timeline sequencing analysis
Q6) A(n)________ is the standard operation procedures of the network when it is running normally.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
39 Verified Questions
39 Flashcards
Source URL: https://quizplus.com/quiz/43044
Sample Questions
Q1) Which of the following is NOT considered a tactic used by hackers to hijack a computer?
A)DoS attacks
B)Spamming activities
C)Phishing scams
D)Breaking and entering
Q2) assam.com
A)Alleged to have flashed pictures of persecuted Muslims
B)Designed to teach users to conduct attacks
C)Used by jihad in Afghanistan
D)Featured international news on al Qaeda
Q3) From May through June of 2002,the al Qaeda Web site appeared at a Web location in
A)Malaysia
B)Texas
C)Michigan
D)All of the above
Q4) Adversaries unable to counter the U.S.military on the battlefield instead exploit military ________.
Q5) David Smith and VicodinES both signed off using the word ________.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/43045
Questions
Q1) Section 302 of the ________ Act compels companies to report all occupational fraud regardless of the amount of the loss.
Q2) What is considered as the number one reason people feel pressured to commit fraud?
A)Financial problems
B)Health-related problems
C)The feeling of power in getting away with the deed
D)All of the above
Q3) Motive
A)Destroying documents prior to an investigation
B)Showing perp had a chance to commit crime
C)Is a strong circumstantial element
D)Finding multiple events of the same error
Q4) The law of ________ holds that some information is protected by law from being released.
Q5) All of the following are good advice about how to handle a fraud suspect EXCEPT
A)Make copies of suspicious documents secretly
B)Don't interview the suspect in his office
C)Show the suspect all the evidence you have collected
D)Convert a verbal confession into a written statement
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
49 Verified Questions
49 Flashcards
Source URL: https://quizplus.com/quiz/43046
Sample Questions
Q1) Pen/Trap Statute
A)When hijackings are suspected
B)Used to collect noncontent traffic
C)Creates a paper tape record of outgoing calls
D)Used when the information likely to be obtained is relevant to an ongoing criminal investigation
Q2) Electronic records that are business records made during the ordinary course of business are admissible under the
A)Business records exception rule
B)Hearsay evidence rule
C)Business exclusionary rule
D)Motion in limine rule
Q3) The ________ extended the Federal Wiretap Statute to include authority over digital transmissions over computer networks.
Q4) What are rules?
A)Regulations that govern legal conduct
B)Regulations that govern the conduct of the people
C)Regulations that govern a society
D)Expectations of the people for a decent society
To view all questions and flashcards with answers, click on the resource link above. Page 15

Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/43047
Sample Questions
Q1) ________ is intentionally making a false statement under oath.
Q2) Guidelines for how to respond to counsel include all of the following EXCEPT
A)Refuse to answer any questions to which you do not know the answer.
B)Do not allow anyone to rush you.
C)Direct your replies to the judge and jury.
D)Do not try to educate the questioner on the topic.
Q3) A common trap used by lawyers is to ask you to offer opinions outside ________.
Q4) As an expert witness,what should you NOT do while in court?
A)Be patient.
B)Try to be relaxed and look at the jury when answering.
C)Be truthful,careful,and precise.
D)Dress casually and comfortably.
Q5) As an expert witness,you are being paid for all the following EXCEPT
A)Your expertise
B)Your ability to prove guilt
C)Your time
D)Your expert view
Q7) Opposing counsel will do their best to ________ or discredit your testimony. Page 16
Q6) Everyone involved in the courts has a(n)________ to protect the legal system and the Constitution.
To view all questions and flashcards with answers, click on the resource link above.
Page 17