Multiple Choice
Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:
A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management
Correct Answer:

Verified
Correct Answer:
Verified
Q6: When a company needs to identify mission-critical
Q6: What term is used to describe a
Q7: Windows stores files on a hard drive
Q8: A subset of business continuity planning and
Q11: When creating a data backup plan or
Q12: Multiple sectors on a disk,when combined,are referred
Q13: RAID 0 technology is based on _.
Q14: Matching<br>-A duplicate of the production site that
Q22: What kind of slack is created from
Q30: What are the steps in damage control?