This is a Free Service provided by Why Fund Inc. (a 501 C3 NonProfit) We thank you for your donation!
*

(1. Click on the course Study Set you wish to learn.) (2. If you wish you can click on "Print" and print the test page.) (3. When you want to take a test...click on anyone of the tests for that Study Set.) (4. Click on "Check Answers" and it will score your test and correct your answers.) (5. You can take all the tests as many times as you choose until you get an "A"!) (6. Automated college courses created from lecture notes, class exams, text books, reading materials from many colleges and universities.)




You are watching: Which of the following scenarios should be covered in a disaster recovery plan?

Linus live CDs and WinFe disks do not automatically mount hard drives, but can b used to view file systems.t/f

true


The shielding of sensitive computing systems and prevention of electronic eavesdropping of any computer emissions is known as FAUST by the U.S. department of defense.t/f

false


The recording of all updates made to a workstation or machine is referred to as configuration management.t/f

true


A disaster recovery plan ensures that workstations and file servers can be restored to their original condition in the event of a catastrophe.t/f

true


Because they are outdated, ribbon cables should not be considered for use within a forensics lab.t/f

false


Candidates who complete the ISCIS test successfully are designated as a ???a. certified forensic computer examiner (CFCE)b. certified forensics investigator (CFI)c. Certified investigative forensics examiner (CIFE)d. certified investigative examiner (CIE)

a


What certification program, sponsored by ISC2, requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations?a. certified computer crime investigatorb. certified forensic computer examinerc. certified cyber forensics professionald. encase certified examiner

c


How long are computing components designed to last in a normal business environment?a. 12 to 16 monthsb. 14 to 26 monthsc. 18 to 36 monthsd. 6 to 90 months

c


Which of the following scenarios should be covered in a disaster recovery plan?a. damage caused by lightning strikesb. damage caused by floodc. damage caused by a virus contaminationd. all of the above

d


Which operating system listed below is not a distribution of the Linux OS?a. minixb. debianc. slackward. fedora

a




See more: Marvel"S Captain America Civil War Art Book, The Art Of Captain America: Civil War

??? describes the characteristics of a safe storage container.a. ISO2960b. NISPOMc. SSO 990d. STORSEC

b


In order to qualify for the certified computer forensic technician, basic level certification, how many hours of computer forensics training are required?a. 10b. 20c. 30d. 40

d