Assignment Content Resource: Project Closeout Paper Grading GuideExplain the project closeout process for your team's project in a 1,050- to 1,400-word paper.Address the following:How customer final a
Question 1
Which of the following is not a type of forensic investigation analysis?
Media | ||
Code | ||
Network | ||
Systems |
Question 2
All are characteristics of a EULA except
A contract between the manufacturer or distributor of a piece of software or a service and the end-user of the application | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
States how the software or service can be used. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Contracts are accepted by removing the cellophane wrap | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cardboard contracts Question 3 Contingency Planning is characterized by all of the following EXCEPT
Which of the following is NOT a characteristic of POLICIES
Which of the following statements is NOT TRUE about Uniform Electronic Transactions Act (UETA)
Which of the following is NOT a characteristic of a GUIDELINE
Which of the following is NOT a characteristic of STANDARDS
|
Question 14
Terms of use on a Web page and No affirmative action required to accept is known as Browserwrap
True
False
Question 15
Contract law deals with violations against societal norms
True
False
Question 16
Military gather intelligence information as well as prepare and respond to cyberattacks during forensic investigations.
True
False
Question 17
What are the steps in creating a business continuity plan?( put in the order 1-5)
- 1. 2. 3. 4. 5.
Design & Maintain the Plan
- 1. 2. 3. 4. 5.
Identify Threats and Potential Controls
- 1. 2. 3. 4. 5.
Determine Recovery Strategies
- 1. 2. 3. 4. 5.
Conduct a Business Impact Analysis
- 1. 2. 3. 4. 5.
Develop the BC/DR Policy
Question 18
Federal Rules of Evidence (FRE) states which of the options are applicable (select all that apply):
The Best Evidence Rule | ||
The Hearsay Rule | ||
Tort Law | ||
Relevant evidence is admissible unless some other rule or law says that it’s not | ||
Fruit of the poisonous tree doctrine | ||
Criminal Law | ||
Evidence can be either inculpatory or exculpatory |
Question 19
Which of the following are elements of an Incident Response Plan?
Investigation | ||
Recovery | ||
Containment of Mitigation | ||
Security Architecture | ||
Evaluation | ||
Review | ||
Incident Triage |
Question 20
Put the Creation of Security Policy in order from 1-4
- 1. 2. 3. 4.
Review standards/policies for compliance
- 1. 2. 3. 4.
Establish standards and policies
- 1. 2. 3. 4.
Create high-level statements
- 1. 2. 3. 4.
Establish procedures