CIS 359 STUDY Education Redefined /cis359study.com CIS 359 STUDY Education Redefined /cis359study.com | Page 10

The ____ handles computer crimes that are categorized as felonies.
• Question 8
Forensic investigators use ____ copying when making a forensic image of a device, which reads a sector( or block; 512 bytes on most devices) from the source drive and writes it to the target drive; this process continues until all sectors on the suspect drive have been copied.
• Question 9
Grounds for challenging the results of a digital investigation can come from possible ____— that is, alleging that the relevant evidence came from somewhere else or was somehow tainted in the collection process.
• Question 10
The U. S. Department of Homeland Security’ s Federal Emergency Management Association has developed a support Web site at ____ that includes a suite of tools to guide the development of disaster recovery / business continuity plans.
• Question 11
Identifying measures, called ____, that reduce the effects of system disruptions can reduce continuity life-cycle costs.
• Question 12
Two dominantly recognized professional institutions certifying business continuity professionals agree on the ____ as the basis for certification.
• Question 13