Please respond to the following: Determine which area you believe provides the greatest challenge for organizations implementing new pricing strategies. Support your argument with specific examples. 

Question 1

Which of the following is not a type of forensic investigation analysis?

Media

Code

Network

Systems


Question 2

All are characteristics of a EULA except

A contract between the manufacturer or distributor of a piece of software or a service and the end-user of the application

States how the software or service can be used.

Contracts are accepted by removing the cellophane wrap

Cardboard contracts


Question 3

Contingency Planning is characterized by all of the following EXCEPT

Incident Response 

Information Governance

Busi Business Continuity 

Disas disaster Recovery 

Question 4

Which of the following is NOT a characteristic of POLICIES

High-level statements of information security goals 

Guideline for the means to attain goals 

Mandatory activity, actions, rules, or regulations 

Direction for information security program

Question 5

Which of the following statements is NOT TRUE about  Uniform Electronic Transactions Act (UETA) 

Online or electronic contracts are just as valid as traditional, paper-based contracts 

Only certain digital signature vendor watermarks are valid

Purpose is to remove barriers to electronic commerce by validating online contracts 

Adopted by 47 states

Question 6

Which of the following is NOT a characteristic of a GUIDELINE

General statements of suggested best practices

Focus on achieving required policy levels 

Framework for implementation of procedures 

Step-by-step checklists 

Not mandatory

Question 7

Which of the following is NOT a characteristic of STANDARDS

High-level statements of information security goals

Mandatory activity, actions, rules, or regulations 

Support for policies 

Specific directions to put policies into effect


Question 8

Tort law follows The Reasonable Man standard.  

 True

 False


Question 9

A felony is a minor crime

 True

 False

Question 10

Criminal law aims to deter behavior: Punishment for behavior and Rehabilitation of the offender.  

 True

 False

Question 11

 Tort law is part of civil law 

 True

 False


Question 12

 Contracts require reciprocal exchange of tangible value. 

 True

 False

Question 13

Consent Law clarifies the relationships between individuals, groups, and organizations as well as between two elements: offer and acceptance.  

 True

 False

Question 14

Terms of use on a Web page and No affirmative action required to accept is known as Browserwrap 

 True

 False

Question 15

Contract law deals with violations against societal norms 

 True

 False

Question 16

 Military gather intelligence information as well as prepare and respond to cyberattacks during forensic investigations.  

 True

 False


Question 17

What are the steps in creating a business continuity plan?( put in the order 1-5)

         -         1.         2.         3.         4.         5.         

Design & Maintain the Plan


         -         1.         2.         3.         4.         5.         

Identify Threats and Potential Controls


         -         1.         2.         3.         4.         5.         

Determine Recovery Strategies


         -         1.         2.         3.         4.         5.         

Conduct a Business Impact Analysis


         -         1.         2.         3.         4.         5.         

Develop the BC/DR Policy

Question 18

Federal Rules of Evidence (FRE) states which of the options are applicable (select all that apply): 

The Best Evidence Rule 

The Hearsay Rule 

Tort Law

Relevant evidence is admissible unless some other rule or law says that it’s not 

Fruit of the poisonous tree doctrine 

Criminal Law

Evidence can be either inculpatory or exculpatory 

Question 19

Which of the following are elements of an Incident Response Plan?

Investigation

Recovery

Containment of Mitigation

Security Architecture

Evaluation

Review

Incident Triage


Question 20

Put the  Creation of Security Policy in order from 1-4

         -         1.         2.         3.         4.         

Review standards/policies for compliance 


         -         1.         2.         3.         4.         

Establish standards and policies 


         -         1.         2.         3.         4.         

Create high-level statements 


         -         1.         2.         3.         4.         

Establish procedures