00:00

QUESTION 26

ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you categorize this type of account?

Correct Answer: A

QUESTION 27

Which of the following is NOT one of the techniques used to respond to insider threats:

Correct Answer: B

QUESTION 28

In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the system is known as:

Correct Answer: B

QUESTION 29

The correct order or sequence of the Computer Forensic processes is:

Correct Answer: B

QUESTION 30

Computer forensics is methodical series of techniques and procedures for gathering evidence from computing equipment, various storage devices and or digital media that can be presented in a course of law in a coherent and meaningful format. Which one of the following is an appropriate flow of steps in the computer forensics process:

Correct Answer: D