Question 26
Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?
Question 27
Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?
Question 28
A US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to set up a RAID level that requires a minimum of six drives to meet high fault tolerance and high speed for the data read and write operations. What RAID level is John considering to meet this requirement?
Question 29
Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?
Question 30
Matt wants his organization to be prepared for any disaster that may occur in the future. In his preparations for the same, he wants to implement a robust storage system for his servers. After conducting thorough research, he arrives at the conclusion that PASIS architecture would be best suited for his requirements as it combines several critical components to provide survivable data storage. Which of the following components does the PASIS architecture integrate?
