Exam 7: Operations

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of these terms is the correct way to describe a plan that is created to minimize harm to both personnel and facilities during a disaster?

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

A

Indecisive wants to return the organization back to its normal, pre-crisis state. However, he is unable to do this as a result of the impact of the crisis. What should he do instead?

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

C

What consists of large amounts of storage devices linked together by a high-speed private network and storage-specific switches?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

What type of system can be installed on individual workstations or servers to watch for inappropriate or anomalous activity?

(Multiple Choice)
4.8/5
(31)

There are many different types of computer crimes that can be committed with different methods. What method would include tracking and exploiting network traffic?

(Multiple Choice)
4.8/5
(34)

It is important to develop a system for contacting each employee in the event of a crisis. True or False?

(True/False)
4.9/5
(36)

Where shouldn't business continuity and disaster recovery plans be kept once completed?

(Multiple Choice)
4.8/5
(41)

Carrie put Mary in charge of conducting a business impact analysis. What would not be an aspect of a business impact analysis?

(Multiple Choice)
4.8/5
(31)

Cipher locks are keyless and use keypads to control access into an area or facility. These locks have several functionalities that increase their effectiveness. Which item is not one of these functionalities?

(Multiple Choice)
4.9/5
(38)

Pete is transferring evidence in a particular manner from Holland to China for forensic testing. Who has determined how computer evidence is to be handled?

(Multiple Choice)
4.8/5
(34)

What poses a potential risk that can negatively affect a segment or an entire network?

(Multiple Choice)
4.9/5
(36)

What type of system uses sensors and is usually in promiscuous mode?

(Multiple Choice)
4.7/5
(42)

As we know, disasters happen. Sometimes they are manmade and other times they are acts of nature. What is/are a facility disruption type(s)?

(Multiple Choice)
4.9/5
(38)

When it comes to computer crimes, there are two main types of surveillance. Which type would include security guards?

(Multiple Choice)
4.9/5
(36)

How often should a Business Continuity Plan be updated or reviewed?

(Multiple Choice)
4.9/5
(40)

There are many different types of computer crimes that can be committed with different methods. What computer crime allows an attacker to eavesdrop?

(Multiple Choice)
4.8/5
(29)

What technology is used for redundancy and/or performance improvement?

(Multiple Choice)
4.8/5
(35)

What type of evidence pertains to oral or written evidence presented in court that has no firsthand proof of accuracy or reliability?

(Multiple Choice)
4.9/5
(37)

Jim's computer system went crazy and just won't function properly. This upsets Jim greatly because without the computer, there is no work for Jim to do and the company sends people home when their computer is down. What should Jim be concerned with as he packs the computer to send it to the manufacture for repair?

(Multiple Choice)
5.0/5
(37)

Evidence has its own life cycle and courts and laws find evidence categories to garner different weight and values. What type of evidence provides the greatest amount of reliability?

(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)