When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Correct Answer:
B
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles isconsidered BEST practice?
Correct Answer:
D
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Correct Answer:
D
What are the different methods that can be used as access controls?
* 1. Detective.
* 2. Physical.
* 3. Reactive.
* 4. Virtual.
* 5. Preventive.
Correct Answer:
C
Why should a loading bay NEVER be used as a staff entrance?
Correct Answer:
D