Exam 13: Business Continuity
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service.
Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
A
Windows stores files on a hard drive in 512-byte blocks called ____________________.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
sectors
In a(n) ____ cluster, every server in the cluster performs useful work.
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
C
A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field.
(Multiple Choice)
4.7/5
(31)
According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.
(Multiple Choice)
4.8/5
(31)
Describe what happens when the response team arrives and secures the crime scene.
(Essay)
4.9/5
(34)
____ is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields.
(Multiple Choice)
4.9/5
(38)
A ____ typically begins by identifying threats through a risk assessment.
(Multiple Choice)
4.9/5
(39)
The ____ response team serves as first responders whenever digital evidence needs to be preserved.
(Multiple Choice)
4.7/5
(41)
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
(True/False)
4.8/5
(31)
____ is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster.
(Multiple Choice)
4.8/5
(31)
System availability is often expressed as a percentage of uptime in a year.
(True/False)
4.9/5
(34)
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
(Essay)
4.7/5
(28)
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
(Short Answer)
4.8/5
(33)
Describe the Windows page file and discuss why it can be important for evidence recovery.
(Essay)
4.8/5
(41)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)