Question: QUESTION 1 When transporting electronic evidence, it must not be anywhere near a police car radio unit because: a. activating the radio may indicate the
QUESTION 1
When transporting electronic evidence, it must not be anywhere near a police car radio unit because:
a. activating the radio may indicate the police car location
b. activating the radio may make unwanted sound
c. activating the radio may cause an accident
d. activating the radio may potentially damage the electronic evidence.
------------------------------------------------------------------------------------------------
QUESTION 2
In cross-site scripting attack where does the malicious script execute?
a. On the web server
b. In the victims browser
c. On the attackers system
d. In the web app model code
---------------------------------------------------------------------------------------
QUESTION 3
Data evidence collection methods must assure data is authentic so that it will____
a. not affect the outcome of the investigation.
b. make investigation faster.
c. archive it as part of the investigation procedure.
d. give more time to the plaintiff to find a lawyer.
--------------------------------------------------------------------------------------------
QUESTION 4
In email search results, precision means
a. Ratio of false positives to false negatives
b. A measure of effectiveness
c. A measure of false positives
d. Percentage of relevant emails that were found
-----------------------------------------------------------------------------------------
QUESTION 5
Risk =
a. probability threat occurs x number of days
b. probability threat occurs x cost to organization
c. probability recovery x cost to organization
d. number of days for the incident x cost to organization
-------------------------------------------------------------------------------
QUESTION 6
The aim of IT Security Management is to________
a. ensure the confidentiality, integrity and availability of an organization's information, data and IT services.
b. document the security issues in the organization and archives it.
c. ensure the employees in Information security not former white hackers.
d. ensure the managements rectify any issue in IT Security Managements according by the goals set by IT Security Department.
-------------------------------------------------------------
QUESTION 7
Which of the following can control Social media risk?
a. Brand hijacking
b. Firewall
c. Regulatory violations
d. Reputational damage
-----------------------------------------------------------------------------------------------
QUESTION 8
Crime scene must be secure for the following reasons except:
a. Ensure people safety.
b. Ensure only law enforcement is allowed.
c. Preserve the integrity of the evidence.
d. Destroy the evidence before first responder arrive.
----------------------------------------------------------------------------------------
QUESTION 9
A smartphone is considered to be a ______ generation
a. 1G phones
b. 2G Phones
c. 2.5G Phones
d. 3G Phones
------------------------------------------------------------------------------------
QUESTION 10
Civil investigation is involved in the case of_____
a. government agency
b. a dispute between two entities (public or private)
c. within the confines of an organization
d. dispute between two business firms
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
