5 Written questions
5 Matching questions
- Risk Appetite
- Value Chain
- What function would you use in FTK Imager to automatically grab commonly used files from the registry?
- Systems Review
- Annuity Due (Begin Mode)
- a Obtain Protected Files
- b ...
- c Reviewing system documentation and interviewing appropriate personnel to determine if the necessary procedures are in place.
- d The amount of risk a company is willing to accept in order to achieve its goals and objectives.
- e Conceptualized organization of activities an organization performs to provide value to their customers.
5 Multiple choice questions
- Software written especially for auditors that generates programs that perform the audit functions.
- "An exact copy of the most current version of a database, file, or software program."
- When the system displays a document with highlighted blank spaces and waits for the data to be entered.
- 365/Accounts Receivable Turnover
5 True/False questions
Mail Message → Any software that can be used to do harm.
file → -Uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver.
-Properly synchronized, the net effect is to maintain a single logical channel.
-To an unintended receiver, FHSS appears to be short-duration impulse
What formats of hash sets can be imported into FTK? → Force of the Earth on you
unstructured decisions → "nonrecurring and non-routine, require judgment and intuition. "
The Server → There are many types of servers
-Hyper Text Transfer Protocol (HTTP)
-File Transfer Protocol (FTP)
-Simple Mail Transfer Protocol (SMTP)
-Post Office Protocol (POP)