Te company suspects an employee to send unauthorized e-mails to competitors. These e-mails allegedly containing confidential company dat a. Which of the following is the most important step you can take in maintaining the chain of custody?
In order to maintain a mail server including all logs.
To seize the employee's computer.
Make copies of that employee's e-mail
Place of spyware on the employee's PC to strengthen these efforts.
Which of the following is a classification system for public or commercial data levels? Each correct answer represents a complete solution. Check all that apply
Which of the following is a formula, practice, design, instrument, pattern, or acquisition of information, which is not widely known, but which the company can obtain an economic advantage over its competitors?
Which of the following backup units will take the longest recovery time?
Mobile backup site
John works in a Security Soft Tech Inc. He works with his team of disaster recovery management plan. One of his team members is undoubtedly related to the most cost effective testing of DRP plan. According to you, which of the following test disaster recovery plans need to be the most cost effective and efficient way to identify overlaps plan prior to conducting more demanding exercises?
A full-scale exercise
a walk-through drill
Structured walk-through test