Search Header Logo

601uC

Authored by Jose Manuel Rios

Computers

University

Used 3+ times

601uC
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is least volatile according to the forensic order of volatility?

CPU registers 

Hard drives

Routing tables

Cache memory

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As part of monthly incident response preparations, your organization goes through a sample incident step by step to validate what each person will do in the incident. What type of exercise is this?

Walkthrough

Checklist test

ISCP

Simulation test

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a site without hardware set up in advance?

Cold spare

Cold site

Hot spare

Hot site 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following allows redundancy by saving data to multiple hard drives at once?

NIC teaming 

RAID

Redundant power supply

Back power source

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


Which of the following is the most serious concern when rebuilding the content of a failed RAID drive from parity?

The resulting rebuilt drive may not be a perfect mirror of the remaining good drive.

option

The array must be based on RAID 0.

option

The rebuild will not work if the array uses striping.

option

Other drives in the array may fail.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What document specifically covers moving operations to a temporary site?

DRP

COOP

BCP

BIA

Answer explanation

A continuity of operations plan (COOP) includes procedures for moving critical operations to a temporary site during disaster recovery. It can apply to general business functions as well as IT systems in particular.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a security incident, you rush to take a screenshot of a telltale running process before you leisurely take a backup of suspicious files on the hard drive. What forensic principle are you exercising?

Order of volatility

eDiscovery

Chain of custody

Audit trail

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?