Question: QUESTION 1 When transporting electronic evidence, it must not be anywhere near a police car radio unit because: a. activating the radio may indicate the

QUESTION 1

When transporting electronic evidence, it must not be anywhere near a police car radio unit because:

a. activating the radio may indicate the police car location

b. activating the radio may make unwanted sound

c. activating the radio may cause an accident

d. activating the radio may potentially damage the electronic evidence.

------------------------------------------------------------------------------------------------

QUESTION 2

In cross-site scripting attack where does the malicious script execute?

a. On the web server

b. In the victims browser

c. On the attackers system

d. In the web app model code

---------------------------------------------------------------------------------------

QUESTION 3

Data evidence collection methods must assure data is authentic so that it will____

a. not affect the outcome of the investigation.

b. make investigation faster.

c. archive it as part of the investigation procedure.

d. give more time to the plaintiff to find a lawyer.

--------------------------------------------------------------------------------------------

QUESTION 4

In email search results, precision means

a. Ratio of false positives to false negatives

b. A measure of effectiveness

c. A measure of false positives

d. Percentage of relevant emails that were found

-----------------------------------------------------------------------------------------

QUESTION 5

Risk =

a. probability threat occurs x number of days

b. probability threat occurs x cost to organization

c. probability recovery x cost to organization

d. number of days for the incident x cost to organization

-------------------------------------------------------------------------------

QUESTION 6

The aim of IT Security Management is to________

a. ensure the confidentiality, integrity and availability of an organization's information, data and IT services.

b. document the security issues in the organization and archives it.

c. ensure the employees in Information security not former white hackers.

d. ensure the managements rectify any issue in IT Security Managements according by the goals set by IT Security Department.

-------------------------------------------------------------

QUESTION 7

Which of the following can control Social media risk?

a. Brand hijacking

b. Firewall

c. Regulatory violations

d. Reputational damage

-----------------------------------------------------------------------------------------------

QUESTION 8

Crime scene must be secure for the following reasons except:

a. Ensure people safety.

b. Ensure only law enforcement is allowed.

c. Preserve the integrity of the evidence.

d. Destroy the evidence before first responder arrive.

----------------------------------------------------------------------------------------

QUESTION 9

A smartphone is considered to be a ______ generation

a. 1G phones

b. 2G Phones

c. 2.5G Phones

d. 3G Phones

------------------------------------------------------------------------------------

QUESTION 10

Civil investigation is involved in the case of_____

a. government agency

b. a dispute between two entities (public or private)

c. within the confines of an organization

d. dispute between two business firms

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!