ITNT-237 ch13 – Flashcards

Unlock all answers in this set

Unlock answers
question
Most metadata about a file is generated and recorded automatically without the user's knowledge.
answer
True
question
the ____ response team serves as first responders whenever digital evidence needs to be preserved.
answer
computer forensics
question
____ data is the most difficult type of data to capture
answer
Volatile
question
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information—even if it has been altered or erased—that can be used in the pursuit of the attacker or criminal
answer
Computer forensics
question
____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer
answer
Drive file slack
question
A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data
answer
warm site
question
A ____ typically begins by identifying threats through a risk assessment
answer
BIA
question
____ is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields
answer
Van Eck phreaking
question
A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field.
answer
Faraday cage
question
System availability is often expressed as a percentage of uptime in a year
answer
True
question
The ability of an organization to maintain its operations and services in the face of a disruptive event
answer
Business continuity
question
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient
answer
Business continuity planning and testing
question
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees
answer
Succession planning
question
Analyzes the most important mission-critical business functions and then identifies and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position
answer
BIA
question
Focuses on protecting and restoring the information technology functions and services that support the business
answer
Disaster recovery
question
The average time needed to reestablish services to their previous condition
answer
MTTR
question
The average time until a component fails, cannot be repaired, and must be replaced
answer
MTBF
question
The sudden flow of electric current between two objects
answer
ESD
question
The application of science to questions that are of interest to the legal profession
answer
Forensics
question
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
answer
True
question
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
answer
False
question
____ is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster
answer
Business continuity planning and testing
question
In a(n) ____ cluster, every server in the cluster performs useful work.
answer
symmetric server
question
____ plans typically include procedures to address redundancy and fault tolerance as well as data backups.
answer
Disaster recovery
question
Multiple sectors are used to make up a ____
answer
cluster
question
A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service.
answer
service level agreement
question
____ pertains only to the last sector of a file.
answer
RAM slack
question
A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.
answer
single point of failure
question
The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence
answer
chain of custody
question
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
answer
False
question
A ____ is a snapshot of the current state of the computer that contains all current settings and data
answer
system image
question
According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics
answer
85
question
A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source
answer
uninterruptible power supply
question
A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards
answer
mirror image
question
In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure
answer
asymmetric server
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New