Question: Question 16 Generally, the three phases of a computer forensics investigation are to acquire the O True O False evidence, authenbcate the evidence, and then
Question 16 Generally, the three phases of a computer forensics investigation are to acquire the O True O False evidence, authenbcate the evidence, and then analyze the evidence Question 17 An example of a preventive control would be a feewall because it stops incidents or breaches immediately and is designed to prevent such incidents from occurring True False Question 18 A Syn tood attack is an older knd of Dos atack andno longer used True e False Question 19 The Sarbanes Oxley (SOX) Act became law in 1999 and was meant to repeal evisting laws so et banss, vestem and ofher financial services companies could merge O True Faise Question 20 While security auareness in employees is important welleducated employees do not play a significant role in the reduction of risk O Faise oes n play a sontcart row m uon Save and Submit ^ O Type here to search
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
