Review Questions

1. What are two general ways in which computers are involved in security violations?

2. What is computer evidence?

3. What is an incident response team?

4. What is real evidence?

5. What is documentary evidence?

6. What is demonstrative evidence?

7. What is a subpoena?

8. What is a search warrant?

9. What is the chain of custody?

10. What is admissible evidence?

Get Computer Forensics JumpStart, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.