
md 271-300
Authored by Alikhan Aitzhanov
English
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In security management, _____ is what authorizes an IT system to process, store, or transmit information. It is issued by a management official and serves as a means of ensuring that systems are of adequate quality.
Accreditation
Assurance
Licensing
approval
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The original purpose of the entire ISO 27000 series was to provide a set of _____ an organization can be certified to. Part of this certification involves an audit to ensure compliance with the standard.
Policies
Standards
Guidelines
practices
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital _____ is the use of technical investigation and analysis techniques to identify, collect, preserve, and analyze electronic items of potential evidentiary value so that they may be admitted as evidence in a court of law.
Analytics
Semantics
Catalytics
Forensics
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The two approaches the organization can take regarding investigating events are either “_____” or “_____”.
Live and let live, fix and forget
Apprehend and prosecute, catch and release
Fix and forget, document and refer
Apprehend and prosecute, fix and forget
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Internal investigators must be properly _____ and must follow strict policies and procedures in their investigations.
Trained
Briefed
Advised
Consulted
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The concept known as _____ or chain of evidence means that all items of interest must also be secured in a location the organization can prove has not been accessed by anyone other than authorized individuals.
Chain or results
Chain of custody
Chain of coherence
Chain of facts
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ is a challenge to forensics investigators because even if the employee does decide to store their information on organizational equipment, they may download and use free tools preventing the organization from finding out exactly what data is stored.
Encryption
Hashing
USB memory
Cloud storage
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
24 questions
Text 2 - Treehugger (about cats) Reading
Quiz
•
University
25 questions
English 3- First Term Exam
Quiz
•
University
25 questions
B2 2nd grammar exam
Quiz
•
University
25 questions
Simple Present - Present Continuous - Modals
Quiz
•
University
30 questions
LSC 1103 Report Factors, Titles, Types, Findings and Analysis
Quiz
•
University
24 questions
RP/RR_MID TERM TEST_THEORY OF TRANSLATION_121
Quiz
•
University
24 questions
PRESENT PERFECT SIMPLE&CONTINIOUS
Quiz
•
University
25 questions
UNITS 3 - 4
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for English
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
21 questions
Past Perfect Tense
Quiz
•
University
21 questions
Contractions
Quiz
•
KG - University
8 questions
Because of Winn-Dixie Chapters 4-6
Quiz
•
KG - University
14 questions
Charlie and the Chocolate Factory Chapters 11-20
Quiz
•
2nd Grade - University