CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 10

The ____ handles computer crimes that are categorized as felonies .
• Question 8
Forensic investigators use ____ copying when making a forensic image of a device , which reads a sector ( or block ; 512 bytes on most devices ) from the source drive and writes it to the target drive ; this process continues until all sectors on the suspect drive have been copied .
• Question 9
Grounds for challenging the results of a digital investigation can come from possible ____— that is , alleging that the relevant evidence came from somewhere else or was somehow tainted in the collection process .
• Question 10
The U . S . Department of Homeland Security ’ s Federal Emergency Management Association has developed a support Web site at ____ that includes a suite of tools to guide the development of disaster recovery / business continuity plans .
• Question 11
Identifying measures , called ____, that reduce the effects of system disruptions can reduce continuity life-cycle costs .
• Question 12
Two dominantly recognized professional institutions certifying business continuity professionals agree on the ____ as the basis for certification .
• Question 13