The EBK designates the technology forensics role as the "____" professional.
A. computer forensics
B. digital forensics
C. incident management
D. security
Answer: B
You might also like to view...
Discuss the three principles that high-level security frameworks like the EBK employ.
What will be an ideal response?
Which of the following means the loss of CIA could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals?
A) High potential impact B) Moderate potential impact C) Low potential impact D) No potential impact
If the command dhcpd is issued (without arguments) on a Linux PC with multiple network interfaces, which network interfaces does the DHCP server listen on?
What will be an ideal response?
A single command to accomplish a task or multiple tasks automatically is called a(n) ________
Fill in the blank(s) with correct word