Multiple Choice
Matching
-Using technology to search for computer evidence of a crime.
A) Business continuity
B) Chain of custody
C) Clustering
D) Computer forensics
E) Continuity of operations
F) Faraday cage
G) Hot site
H) Mean time between failures (MTBF)
I) Recovery point objective
J) Risk assessment
Correct Answer:

Verified
Correct Answer:
Verified
Q21: How can an administrator keep devices powered
Q29: A service contract between a vendor and
Q38: Discuss the purpose and importance of the
Q40: A metallic enclosure that prevents the entry
Q41: _ is data about data.
Q42: Generally, _ focuses on restoring computing and
Q46: Matching<br>-The ability of an organization to maintain
Q47: The process of identifying exposure to threats,
Q49: Matching<br>-A process of documentation that shows that
Q50: What is the name for an image