Filters
Question type

Study Flashcards

Describe what happens when the response team arrives and secures the crime scene.

Correct Answer

verifed

verified

The physical surroundings of the compute...

View Answer

Matching -​The ability of a business to continue to function in the even of a disaster.


A) Business continuity
B) Chain of custody
C) Clustering
D) Computer forensics
E) Continuity of operations
F) Faraday cage
G) Hot site
H) Mean time between failures (MTBF)
I) Recovery point objective
J) Risk assessment

K) D) and G)
L) D) and J)

Correct Answer

verifed

verified

Describe the purpose of a disaster recovery plan.

Correct Answer

verifed

verified

A disaster recovery plan (DRP) is a writ...

View Answer

Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?


A) recovery site
B) recovery point
C) single point of failure
D) cascade point of failure

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What is required upon completion of an evidence examination?

Correct Answer

verifed

verified

Upon completion of the examina...

View Answer

Matching -The maximum length of time that an organization can tolerate between backups.​


A) Business continuity
B) Chain of custody
C) Clustering
D) Computer forensics
E) Continuity of operations
F) Faraday cage
G) Hot site
H) Mean time between failures (MTBF)
I) Recovery point objective
J) Risk assessment

K) F) and I)
L) I) and J)

Correct Answer

verifed

verified

Select below the type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems, and file and print services:


A) symmetric network
B) symmetric server
C) asymmetric network
D) asymmetric server

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A system that can function for an extended period of time with little downtime is said to have ___________________.​

Correct Answer

verifed

verified

A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:


A) bollard
B) mantrap
C) Faraday cage
D) Newton cage

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Identify two scenarios that could be used in a BIA.

Correct Answer

verifed

verified

What would happen if the portion of the ...

View Answer

A snapshot of the current state of a computer that contains all current settings and data is known as what option below:


A) system standard
B) system view
C) system image
D) system baseline

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What are the objectives of disaster exercises?

Correct Answer

verifed

verified

Test the efficiency of interde...

View Answer

​What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?


A) ​RAID 0
B) ​RAID 1
C) ​RAID 2
D) ​RAID 5

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Most metadata about a file is generated and recorded automatically without the user's knowledge.

A) True
B) False

Correct Answer

verifed

verified

RAID level 0 is known as disk mirroring, because it involves connecting multiple drives in the server to the same disk controller card.

A) True
B) False

Correct Answer

verifed

verified

What type of plans include procedures to address redundancy and fault tolerance as well as data backups?


A) Enterprise recovery
B) Disaster recovery
C) Business recovery
D) Emergency recovery

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Matching -​The process of identifying threats.


A) Business continuity
B) Chain of custody
C) Clustering
D) Computer forensics
E) Continuity of operations
F) Faraday cage
G) Hot site
H) Mean time between failures (MTBF)
I) Recovery point objective
J) Risk assessment

K) E) and I)
L) F) and H)

Correct Answer

verifed

verified

RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.

A) True
B) False

Correct Answer

verifed

verified

According to the Federal Bureau of Investigation (FBI) , what percentage of crime committed today leaves behind digital evidence that can be retrieved via computer forensics?


A) 65
B) 75
C) 85
D) 95

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?

Correct Answer

verifed

verified

When a file that is being saved is not l...

View Answer

Showing 21 - 40 of 50

Related Exams

Show Answer