Question 26
The most common type(s) of intellectual property is(are):
Question 27
Digital evidence must:
Question 28
The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:
Question 29
Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle such situations?
Question 30
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
