Filters
Question type

Study Flashcards

Generally, ____________________ focuses on restoring computing and technology resources to their former state. ​

Correct Answer

verifed

verified

____________________ is data about data.

Correct Answer

verifed

verified

Matching -A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence.​


A) Business continuity
B) Chain of custody
C) Clustering
D) Computer forensics
E) Continuity of operations
F) Faraday cage
G) Hot site
H) Mean time between failures (MTBF)
I) Recovery point objective
J) Risk assessment

K) B) and I)
L) A) and H)

Correct Answer

verifed

verified

How can an administrator keep devices powered when power is interrupted?


A) uninterruptible power supply
B) redundant power supply
C) uninterruptible system supply
D) replica power supply

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:


A) service level agreement
B) recovery point objective
C) recovery time objective
D) service point agreement

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Matching -Using technology to search for computer evidence of a crime.​


A) Business continuity
B) Chain of custody
C) Clustering
D) Computer forensics
E) Continuity of operations
F) Faraday cage
G) Hot site
H) Mean time between failures (MTBF)
I) Recovery point objective
J) Risk assessment

K) B) and F)
L) B) and H)

Correct Answer

verifed

verified

The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:


A) Business continuity planning and testing
B) Disaster planning
C) Business management planning and testing
D) Enterprise disaster planning

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?


A) baseline
B) mirror image
C) logical image
D) thin image

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Matching -The ability of an organization to maintain its operations and services in the face of a disruptive event.​


A) Business continuity
B) Chain of custody
C) Clustering
D) Computer forensics
E) Continuity of operations
F) Faraday cage
G) Hot site
H) Mean time between failures (MTBF)
I) Recovery point objective
J) Risk assessment

K) B) and E)
L) D) and F)

Correct Answer

verifed

verified

Discuss the purpose and importance of the chain of custody.

Correct Answer

verifed

verified

The chain of custody documents that the ...

View Answer

Showing 41 - 50 of 50

Related Exams

Show Answer