Search Header Logo

md 271-300

Authored by Alikhan Aitzhanov

English

University

Used 1+ times

md 271-300
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In security management, _____ is what authorizes an IT system to process, store, or transmit information. It is issued by a management official and serves as a means of ensuring that systems are of adequate quality.

Accreditation

Assurance

Licensing

approval

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The original purpose of the entire ISO 27000 series was to provide a set of _____ an organization can be certified to. Part of this certification involves an audit to ensure compliance with the standard.

Policies

Standards

Guidelines

practices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital _____ is the use of technical investigation and analysis techniques to identify, collect, preserve, and analyze electronic items of potential evidentiary value so that they may be admitted as evidence in a court of law.

Analytics

Semantics

Catalytics

Forensics

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The two approaches the organization can take regarding investigating events are either “_____” or “_____”.

Live and let live, fix and forget

Apprehend and prosecute, catch and release

Fix and forget, document and refer

Apprehend and prosecute, fix and forget

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Internal investigators must be properly _____ and must follow strict policies and procedures in their investigations.

Trained

Briefed

Advised

Consulted

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The concept known as _____ or chain of evidence means that all items of interest must also be secured in a location the organization can prove has not been accessed by anyone other than authorized individuals.

Chain or results

Chain of custody

Chain of coherence

Chain of facts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a challenge to forensics investigators because even if the employee does decide to store their information on organizational equipment, they may download and use free tools preventing the organization from finding out exactly what data is stored.

Encryption

Hashing

USB memory

Cloud storage

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?