Which of the following would be MOST important to guarantee that the computer evidence will be admissible in court?
What is a hot-site facility?
Which of the following backup methods is primarily run when time and tape space permits, and is used for the system archive or baselined tape sets?
The absence of a safeguard, or a weakness in a system that may possibly be exploited is called a(n)?
Risk mitigation and risk reduction controls for providing information security are classified within three main categories, which of the following are being used?
Failure of a contingency plan is usually:
When should a post-mortem review meeting be held after an intrusion has been properly taken care of?
Computer-generated evidence is considered:
Which of the following proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?
Which element must computer evidence have to be admissible in court?
What is the highest amount a company should spend annually on countermeasures for protecting an asset valued at $1,000,000 from a threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 30%?
Which backup method does not reset the archive bit on files that are backed up?
An Intrusion Detection System (IDS) is what type of control?
In which of the following phases of system development life cycle (SDLC) is contingency planning most important?
When first analyzing an intrusion that has just been detected and confirming that it is a true positive, which of the following actions should be done as a first step if you wish to prosecute the attacker in court?
Within the realm of IT security, which of the following combinations best defines risk?
A Business Continuity Plan should be tested:
Which of the following statements pertaining to a Criticality Survey is incorrect?
Computer security should be first and foremost which of the following:
A momentary low voltage, from 1 cycle to a few seconds, is a: