A living high level document that states in writing a requirement and directions on how an agency plans to protect its information technology assets is called:
A. Information security Policy
B. Information security Procedure
C. Information security Baseline
D. Information security Standard
Bit stream image copy of the digital evidence must be performed in order to:
A. Prevent alteration to the original disk
B. Copy the FAT table
C. Copy all disk sectors including slack space
D. All the above
According to the Evidence Preservation policy, a forensic investigator should make at least ..................... image copies of the digital evidence.
A. One image copy
B. Two image copies
C. Three image copies
D. Four image copies
According to the Fourth Amendment of USA PATRIOT Act of 2001; if a search does NOT violate a person's "reasonable" or "legitimate" expectation of privacy then it is considered:
A. Constitutional/ Legitimate
B. Illegal/ illegitimate
C. Unethical
D. None of the above
An information security policy must be:
A. Distributed and communicated
B. Enforceable and Regularly updated
C. Written in simple language
D. All the above
The product of intellect that has commercial value and includes copyrights and trademarks is called:
A. Intellectual property
B. Trade secrets
C. Logos
D. Patents
The most common type(s) of intellectual property is(are):
A. Copyrights and Trademarks
B. Patents
C. Industrial design rights and Trade secrets
D. All the above
Ensuring the integrity, confidentiality and availability of electronic protected health information of a patient is known as:
A. Gramm-Leach-Bliley Act
B. Health Insurance Portability and Privacy Act
C. Social Security Act
D. Sarbanes-Oxley Act
The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:
A. Audit trail policy
B. Logging policy
C. Documentation policy
D. Evidence Collection policy
The steps followed to recover computer systems after an incident are:
A. System restoration, validation, operation and monitoring
B. System restoration, operation, validation, and monitoring
C. System monitoring, validation, operation and restoration
D. System validation, restoration, operation and monitoring
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-89 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.