
md 271-300
Quiz
•
English
•
University
•
Practice Problem
•
Medium
Alikhan Aitzhanov
Used 1+ times
FREE Resource
Enhance your content in a minute
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In security management, _____ is what authorizes an IT system to process, store, or transmit information. It is issued by a management official and serves as a means of ensuring that systems are of adequate quality.
Accreditation
Assurance
Licensing
approval
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The original purpose of the entire ISO 27000 series was to provide a set of _____ an organization can be certified to. Part of this certification involves an audit to ensure compliance with the standard.
Policies
Standards
Guidelines
practices
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital _____ is the use of technical investigation and analysis techniques to identify, collect, preserve, and analyze electronic items of potential evidentiary value so that they may be admitted as evidence in a court of law.
Analytics
Semantics
Catalytics
Forensics
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The two approaches the organization can take regarding investigating events are either “_____” or “_____”.
Live and let live, fix and forget
Apprehend and prosecute, catch and release
Fix and forget, document and refer
Apprehend and prosecute, fix and forget
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Internal investigators must be properly _____ and must follow strict policies and procedures in their investigations.
Trained
Briefed
Advised
Consulted
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The concept known as _____ or chain of evidence means that all items of interest must also be secured in a location the organization can prove has not been accessed by anyone other than authorized individuals.
Chain or results
Chain of custody
Chain of coherence
Chain of facts
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ is a challenge to forensics investigators because even if the employee does decide to store their information on organizational equipment, they may download and use free tools preventing the organization from finding out exactly what data is stored.
Encryption
Hashing
USB memory
Cloud storage
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
24 questions
2/10 WEEK VOCAB PRACTICE
Quiz
•
12th Grade - University
24 questions
Chapter 4: Mastering Self-Management
Quiz
•
University
28 questions
TẢ NGƯỜI SUB
Quiz
•
University
25 questions
use-of-english-a1plus-quiz3
Quiz
•
1st Grade - University
24 questions
Vocabulary Quiz
Quiz
•
5th Grade - University
26 questions
The History Boys
Quiz
•
University
25 questions
Ingat-ingat yuk!
Quiz
•
7th Grade - University
25 questions
REVIEW IBI
Quiz
•
University
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
