Question 27 0 out of 25 points the digital forensics

This preview shows page 7 - 10 out of 10 pages.

Question 27 0 out of 2.5 points The digital forensics competency has the required functional perspective of ____.
Question 28 2.5 out of 2.5 points The enterprise continuity competency has the required functional perspective of ____.
Question 29 2.5 out of 2.5 points The procurement competency has the required functional perspective of
____.
Question 30 2.5 out of 2.5 points The problem of ____ has to be resolved if the recommendations of the EBK are ever going to be put into practice.
Question 31 2.5 out of 2.5 points A(n) ____ guides individual access and employment of data.
Question 32 2.5 out of 2.5 points ____ incidents include such things as pre-attack probes, unauthorized access attempts, or structural vulnerabilities.
Question 33 0 out of 2.5 points In ____ cryptography, the same key is used for both encryption and decryption.
Question 34 2.5 out of 2.5 points In simple terms, cryptography involves a(n) ____ algorithm.
Question 35 2.5 out of 2.5 points ____ authentication is highly secure because physical characteristics such as fingerprints are unique to the individual and hard to duplicate.
Question 36 2.5 out of 2.5 points A lot of forensic evidence exists as ____ information within a computer system.
Question 37 2.5 out of 2.5 points ____ clogs user inboxes and can adversely affect the performance of the system if it is not removed in a timely fashion.
Answer: Spa m Correct Answer: Spa m Question 38 2.5 out of 2.5 points The ____ policy dictates how and in what timeframe spam is removed.
Question 39 0 out of 2.5 points The one single aspect of the conventional data processing operation that is certain to require definition from a forensic perspective is the ____ policy.
Question 40 2.5 out of 2.5 points The actual requirements for each forensics project are derived from ____.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture