CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 6
•
Question 31
A ____ is defined by the ICM as a disruption in the
company’s business that occurs without warning and is likely to
generate news coverage and may adversely impact employees,
investors, customers, suppliers, and other stakeholders.
•
Question 32
Cross-training provides a mechanism to get everyone out of
the crime scene and thus prevent contamination of possible
evidentiary material.
•
Question 33
The ____ handles computer crimes that are categorized as
felonies.
•
Question 34
The forensic tool ____ does extensive pre-processing of
evidence items that recovers deleted files and extracts e-mail
messages.
•
Question 35
____ is used both for intrusion analysis and as part of evidence
collection and analysis.
•
Question 36
____ is the determination of the initial flaw or vulnerability
that allowed an incident to occur.
•
Question 37
Most digital forensic teams have a prepacked field kit, also
known as a(n) ____.
•
Question 38