1.
Which of the following is the best reason for the use of an automated risk analysis tool?
2.
A deviation from an organization-wide security policy requires which of the following?
3.
Which of the following is biggest factor that makes Computer Crimes possible?
4.
Under United States law, an investigator's notebook may be used in court in which of the following scenarios?
5.
In addition to the Legal Department, with what company function must the collection of physical evidence be coordinated if an employee is suspected?
6.
To be admissible in court, computer evidence must be which of the following?
7.
The typical computer fraudsters are usually persons with which of the following characteristics?
8.
Once evidence is seized, a law enforcement officer should emphasize which of the following?
9.
Which of the following cannot be undertaken in conjunction or while computer incident handling is ongoing?
10.
Devices that supply power when the commercial utility power system fails are called which of the following?