Filters
Question type

Study Flashcards

Most metadata about a file is generated and recorded automatically without the user's knowledge.

A) True
B) False

Correct Answer

verifed

verified

Match each term with the correct statement below.

Premises
The sudden flow of electric current between two objects
The ability of an organization to maintain its operations and services in the face of a disruptive event
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
The average time until a component fails, cannot be repaired, and must be replaced
Focuses on protecting and restoring the information technology functions and services that support the business
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient.
The application of science to questions that are of interest to the legal profession
Responses
Business continuity planning and testing
Disaster recovery
MTBF
Forensics
MTTR
Succession planning
BIA
Business continuity
ESD

Correct Answer

Business continuity planning and testing
Disaster recovery
MTBF
Forensics
MTTR
Succession planning
BIA
Business continuity
ESD

The air-handling space above drop ceilings (and sometimes even between the walls and under structural floors) used to circulate and otherwise handle air in a building are called ____________________.

Correct Answer

verifed

verified

Identify two scenarios that could be used in a BIA.

Correct Answer

verifed

verified

What would happen if the portion of the ...

View Answer

____________________ is data about data.

Correct Answer

verifed

verified

____ pertains only to the last sector of a file.


A) Disk slack
B) RAM slack
C) ROM slack
D) Edge slack

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A ____ is a snapshot of the current state of the computer that contains all current settings and data.


A) system standard
B) system view
C) system image
D) system baseline

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What are the objectives of disaster exercises?

Correct Answer

verifed

verified

Test the efficiency of interde...

View Answer

A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards.


A) baseline
B) mirror image
C) logical image
D) thin image

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source.


A) uninterruptible power supply
B) redundant power supply
C) uninterruptible system supply
D) replica power supply

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

____ uses technology to search for computer evidence of a crime, can attempt to retrieve information-even if it has been altered or erased-that can be used in the pursuit of the attacker or criminal.


A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

____ data is the most difficult type of data to capture.


A) Volatile
B) Static
C) Non-volatile
D) Persistent

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data.


A) cold site
B) hot site
C) spare site
D) warm site

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.

A) True
B) False

Correct Answer

verifed

verified

In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure.


A) symmetric network
B) symmetric server
C) asymmetric network
D) asymmetric server

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.


A) chain of value
B) chain of use
C) chain of property
D) chain of custody

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.


A) recovery site
B) recovery point
C) single point of failure
D) cascade point of failure

E) None of the above
F) All of the above

Correct Answer

verifed

verified

____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer.


A) RAM slack
B) Edge slack
C) Drive file slack
D) Sector slack

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

____ plans typically include procedures to address redundancy and fault tolerance as well as data backups.


A) Enterprise recovery
B) Disaster recovery
C) Business recovery
D) Emergency recovery

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Describe the purpose of a disaster recovery plan.

Correct Answer

verifed

verified

A disaster recovery plan (DRP) is a writ...

View Answer

Showing 21 - 40 of 42

Related Exams

Show Answer