Question 26

The most common type(s) of intellectual property is(are):
  • Question 27

    Digital evidence must:
  • Question 28

    The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:
  • Question 29

    Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle such situations?
  • Question 30

    Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats: