Multiple Choice
Using technology to search for computer evidence of a crime in order to retrieve information,even if it has been altered or erased,that can be used in pursuit of an attacker or criminal is an example of:
A) computer forensics
B) penetration testing
C) vulnerability testing
D) risk management
Correct Answer:

Verified
Correct Answer:
Verified
Q5: An enterprise contingency plan is copying information
Q6: What term is used to describe a
Q7: What type of element addresses the recovery
Q8: What kind of data can be lost
Q9: Which of the following is the sudden
Q11: The goal of redundancy is to reduce
Q12: Multiple sectors on a disk,when combined,are referred
Q13: Forensics is the application of science to
Q14: Resumption planning is used for the recovery
Q15: A snapshot of the current state of