• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
In a forensic investigation, the most important reason to verify the integrity of acquired data is:
To ensure that the data has not been tampered with
Automated pay per print copiers and printers are available in a library. The problem is that an employee has been embezzling money from the coin boxes for years. Which of the following method will be helpful to detect this earlier?
Improve employee auditing procedures
Which of the following is not available in the document retention policy?
password complexity rules
Refer to the following options, which one is an example of security personnel that administer access control functions rather than audit functions?
Separation of duties
An access control system enables an authority to control access to areas and resources in a given physical facility or computer-based information system. Refer to the following access control methods, which one includes switching work assignments at preset intervals?
Job rotation
Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat. After a system risk assessment performance, it is found that the cost to mitigate the risk was higher than the expected loss if the risk was actualized. Which of the following option is the best practice to deal with this problem?
Accept the risk
Forensic Toolkit is a computer forensics software that scans a hard drive looking for various information. Which of the following should be inclusive in a forensic toolkit?
digital camera
Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat. Which one of the following cannot be used to conduct risk assessments?
disaster exercises
Which of the following action should be taken if an employer gains and loses employees at a high rate?
A review of user access and rights.
Refer to the following organizational documentations, which one describes how to conduct tasks or job functions?
Procedures
During forensic analysis, which of the following utilities can be used to prevent damage to evidence?
Read-only drive connectors