The EBK designates the technology forensics role as the "____" professional.
A. computer forensics
B. digital forensics
C. incident management
D. security
Answer: B
You might also like to view...
Discuss the three principles that high-level security frameworks like the EBK employ.
What will be an ideal response?
Which of the following means the loss of CIA could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals?
A) High potential impact B) Moderate potential impact C) Low potential impact D) No potential impact
A single command to accomplish a task or multiple tasks automatically is called a(n) ________
Fill in the blank(s) with correct word
If the command dhcpd is issued (without arguments) on a Linux PC with multiple network interfaces, which network interfaces does the DHCP server listen on?
What will be an ideal response?