
Ias 2 3A
Authored by Jamaica Basilio
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
Refers to the systematic approach to addressing and managing aftermath of a security breach or cyber incident.
2.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
___________ entails establishing an incident response policy.
3.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
This phase focuses on recognizing and validating security incidents.
4.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
It refers to the practice of using digital tools and techniques to secretly gather confidential or sensitive information without authorization.
5.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
also known as digital or cyber forencics.
6.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
Refers to a network of interconnected devices that collect, exchange and process data in real time.
7.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
Computer forensics began in the
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?