Exam 13: Business Continuity
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data.
(Multiple Choice)
4.7/5
(36)
____ plans typically include procedures to address redundancy and fault tolerance as well as data backups.
(Multiple Choice)
4.8/5
(28)
The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.
(Multiple Choice)
4.9/5
(38)
A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source.
(Multiple Choice)
4.8/5
(34)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(38)
____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer.
(Multiple Choice)
4.7/5
(31)
In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure.
(Multiple Choice)
4.8/5
(36)
A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.
(Multiple Choice)
4.9/5
(33)
A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards.
(Multiple Choice)
4.9/5
(35)
The air-handling space above drop ceilings (and sometimes even between the walls and under structural floors) used to circulate and otherwise handle air in a building are called ____________________.
(Short Answer)
4.7/5
(29)
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information-even if it has been altered or erased-that can be used in the pursuit of the attacker or criminal.
(Multiple Choice)
4.9/5
(40)
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
(True/False)
4.9/5
(31)
Most metadata about a file is generated and recorded automatically without the user's knowledge.
(True/False)
4.8/5
(38)
A ____ is a snapshot of the current state of the computer that contains all current settings and data.
(Multiple Choice)
5.0/5
(35)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)