Capturing the investigative process on videotape and other such documentation is especially important in cases where violations of ________ are alleged

a. digital protocol
b. SMEAC
c. the Electronic Communication Privacy Act
d. business ethics


Answer: c

Computer Science & Information Technology

You might also like to view...

Analyze the following code.

``` int[] list = new int[5]; list = new int[6];``` a. The code has compile errors because the variable list cannot be changed once it is assigned. b. The code has runtime errors because the variable list cannot be changed once it is assigned. c. The code can compile and run fine. The second line assigns a new array to list. d. The code has compile errors because you cannot assign a different size array to list.

Computer Science & Information Technology

What Vim flag will improve your search-and-replace by using the previous search pattern?

A. [&] B. [g] C. [c] D. [p]

Computer Science & Information Technology

Match each item with a statement below.

A. any activity that represents a potential danger or attack on a system or network B. any type of network service that permits users elsewhere on a network to use the network to log on to a system as if they were attached locally while operating remotely C. an ICMP Echo-based operation used to locate active devices on a network D. the process of examining the "footprints" that an attacker leaves behind E. a special-purpose software tool that cycles through all possible TCP and UDP port addresses looking for open ports that then can be probed for access or exploited for vulnerabilities F. a manager system in a DDoS attack G. an IP attack technique whereby an impostor takes over an ongoing communications session between a client and server H. a document that represents the concrete manifestation of an organization's requirements for security practices, rules, and procedures I. a computer system deliberately set up to attract, entice, and entrap would-be attackers, often by being made to appear part of a larger network

Computer Science & Information Technology

Jeff, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?

A. Notify senior management of the issue. B. Develop a probable cause theory. C. Ask Jeff if anything has changed on the system. D. Escalate the issue to the vendor.

Computer Science & Information Technology