Which of the following cryptographic system services proves a user’s identity?
Which of the following cryptographic system services proves a user’s identity?
Which of the following procedures will be involved by the preparation phase of the Incident handling process?
The Incident handling process implemented in an enterprise is responsible to deal with all the
incidents regarding the enterprise. Which of the following procedures will be involved by the
preparation phase of the Incident handling process?
Which methodology is a method to analyze the involved tasks in completing a given project, especially the time
Which methodology is a method to analyze the involved tasks in completing a given project,
especially the time needed to complete each task, and identifying the minimum time needed to
complete the total project?
Which of the following RAID levels provides fault tolerance?
Which of the following RAID levels provides fault tolerance?
Which of the following types of risk response are you following?
You are the project manager for a construction project. The project involves casting of a column in
a very narrow space. Because of the lack of space, casting is highly dangerous. High technical
skill will be required for casting that column. You decide to hire a local expert team for casting that
column. Which of the following types of risk response are you following?
what a user is typing?
Which of the following options is an activity of observing the content that appears on a computer
monitor or watching what a user is typing?
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is c
Which of the following strategies is used to minimize the effects of a disruptive event on a
company, and is created to prevent interruptions to normal business activity?
Which of the following elements of BCP process includes the areas of plan implementation, plan testing…?
Which of the following elements of BCP process includes the areas of plan implementation, plan
testing, and ongoing plan maintenance, and also involves defining and documenting the continuity
strategy?
Which of the following utilities of Helix will he use to accomplish the task?
Allen works as a professional Computer Hacking Forensic Investigator. A project has been
assigned to him to investigate a computer, which is used by the suspect to sexually harass the
victim using instant messenger program. Suspect’s computer runs on Windows operating system.
Allen wants to recover password from instant messenger program, which suspect is using, to
collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following
utilities of Helix will he use to accomplish the task?
Which of the following should the administrator ensure during the test of a disaster recovery plan?
Which of the following should the administrator ensure during the test of a disaster recovery plan?