Jack works as an investigating officer in Private Corporate Investigation Agency
Services. He found a piece of evidence while searching in the location where an
incident happened. He wants to save it for future use so that he can have that
information whenever needed. Which of these is the most volatile memory where he
should avoid saving the collected evidence?
A
Hard disk
B
CPU cache
C
RAM
D
USB drive
Give this one a try later!
CPU cache
,Which statement is not correct about safeguard selection in the risk analysis process?
A
Several criteria should be considered when determining the total cost of the
safeguard.
B
Total cost of ownership (TCO) needs to be included in determining the total cost of
the safeguard.
C
It is most common to consider the cost effectiveness of the safeguard.
D
The most effective safeguard should always be implemented regardless of cost.
Give this one a try later!
The most effective safeguard should always be implemented regardless of
cost.
Which of the following options best describes a cold site?
A
An alternate processing facility with established electrical wiring and HVAC but no
data processing hardware
B
A mobile trailer with portable generators and air-conditioning
C
An alternate processing facility that has all hardware and software installed and is
mirrored with the original site and can be operational within a very short period of
time
D
An alternate processing facility with most data processing hardware and software
installed, which can be operational within a matter of hours to a few days
Give this one a try later!
, An alternate processing facility with established electrical wiring and HVAC
but no data processing hardware
Which best describes a multiple-person technique for use to recover a corrupted
key?
A
Separation of duties
B
Multiple-man rule
C
Staged multiple interaction
D
M of N
Give this one a try later!
M of N
The address space for IPv6 is how many bits?
A
132 bits
B
32 bits
C
128 bits
D
144 bits
Give this one a try later!
, 128 bits
Which of the following best describes an endpoint device?
A
Bridge
B
Router
C
Computer printer
D
Switch
Give this one a try later!
Computer printer
Which of the following most accurately describes eDiscovery?
A
Any information put on legal hold
B
A legal tool used to request suspected evidentiary information that may be used in
litigation
C
All information obtained through proper service of the search warrant
D
Any information owned by an organization with the exception of trade secrets.
Give this one a try later!
Services. He found a piece of evidence while searching in the location where an
incident happened. He wants to save it for future use so that he can have that
information whenever needed. Which of these is the most volatile memory where he
should avoid saving the collected evidence?
A
Hard disk
B
CPU cache
C
RAM
D
USB drive
Give this one a try later!
CPU cache
,Which statement is not correct about safeguard selection in the risk analysis process?
A
Several criteria should be considered when determining the total cost of the
safeguard.
B
Total cost of ownership (TCO) needs to be included in determining the total cost of
the safeguard.
C
It is most common to consider the cost effectiveness of the safeguard.
D
The most effective safeguard should always be implemented regardless of cost.
Give this one a try later!
The most effective safeguard should always be implemented regardless of
cost.
Which of the following options best describes a cold site?
A
An alternate processing facility with established electrical wiring and HVAC but no
data processing hardware
B
A mobile trailer with portable generators and air-conditioning
C
An alternate processing facility that has all hardware and software installed and is
mirrored with the original site and can be operational within a very short period of
time
D
An alternate processing facility with most data processing hardware and software
installed, which can be operational within a matter of hours to a few days
Give this one a try later!
, An alternate processing facility with established electrical wiring and HVAC
but no data processing hardware
Which best describes a multiple-person technique for use to recover a corrupted
key?
A
Separation of duties
B
Multiple-man rule
C
Staged multiple interaction
D
M of N
Give this one a try later!
M of N
The address space for IPv6 is how many bits?
A
132 bits
B
32 bits
C
128 bits
D
144 bits
Give this one a try later!
, 128 bits
Which of the following best describes an endpoint device?
A
Bridge
B
Router
C
Computer printer
D
Switch
Give this one a try later!
Computer printer
Which of the following most accurately describes eDiscovery?
A
Any information put on legal hold
B
A legal tool used to request suspected evidentiary information that may be used in
litigation
C
All information obtained through proper service of the search warrant
D
Any information owned by an organization with the exception of trade secrets.
Give this one a try later!