Which of the following is an asymmetric encryption algorithm?
Which algorithm is a current specification for the encryption of electronic data established by NIST?
When seeking third party digital forensics services, what two attributes should one seek when
making a choice of service provider?
When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially
A. Remove power from all digital devices at the scene to stop the data changing.
B. Photograph all evidence and triage to determine whether live data capture is necessary.
C. Remove all digital evidence from the scene to prevent unintentional damage.
D. Don't touch any evidence until a senior digital investigator arrives.
When a digital forensics investigator is conducting art investigation and handling the original data,
what KEY principle must they adhere to?
In business continuity (BC) terms, what is the name of the individual responsible for recording all
pertinent information associated with a BC exercise or real plan invocation?
Which type of facility is enabled by a contract with an alternative data processing facility which will
provide HVAC, power and communications infrastructure as well computing hardware and a
duplication of organisations existing "live" data?
When undertaking disaster recovery planning, which of the following would NEVER be considered a
In business continuity, what is a battle box?
A. A portable container that holds Items and information useful in the event of an organisational
B. An armoured box that holds all an organisation's backup databases.
C. A collection of tools and protective equipment to be used in the event of civil disturbance.
D. A list of names and addresses of staff to be utilised should industrial action prevent access to a
What term is used to describe the testing of a continuity plan through a written scenario being used
as the basis for discussion and simulation?