What is digital forensics?

Correct answer: A science involving the collection and analysis of digital evidence from computers and networks for investigations.

Explanation

Digital forensics is an investigative field focused on the recovery and analysis of material found in digital devices, often in relation to computer crime or legal disputes. It is a critical tool for both law enforcement and corporate security.

Other questions

Question 1

What is the primary goal of the chief information officer (CIO) in managing a company's information resources?

Question 2

According to the text, which type of computer is described as being about the size of a refrigerator and capable of simultaneously running many different programs to support hundreds or thousands of users?

Question 3

What is the defining characteristic of a Local Area Network (LAN)?

Question 4

What is the primary purpose of a firewall in a corporate network environment?

Question 5

What is the key difference between batch processing and online (real-time) processing of data?

Question 6

What is the function of a Decision Support System (DSS) within a company's management support systems?

Question 7

What is knowledge management (KM), and how does it differ from information management?

Question 8

Juniper Networks estimated that the cost of cybercrime to businesses would exceed what amount in 2019?

Question 9

What is a 'worm' in the context of computer security?

Question 11

What is the primary benefit of a distributed workforce model for companies like Aetna and American Express?

Question 12

What is the fundamental concept behind grid or cloud computing, also known as utility computing?

Question 13

Which software is used to facilitate collaborative efforts of workgroups, allowing people in different locations to work on one project and supporting online meetings?

Question 14

What is the key advantage of a Virtual Private Network (VPN) for a company with widespread offices?

Question 15

How does a data warehouse function within a Management Support System (MSS)?

Question 16

What is the role of an Executive Information System (EIS)?

Question 17

Which technology is a global standard that improves personal connectivity by wirelessly connecting devices like keyboards, mice, and headsets to computers and phones?

Question 18

What is data mining?

Question 19

According to Forrester Research, what percentage of companies with one billion dollars or more in revenues use data warehouses as a management tool?

Question 20

What is the primary function of an Application Service Provider (ASP)?

Question 21

What distinguishes a Trojan horse from a computer virus?

Question 22

Which information system is designed to provide advice to managers that is similar to what they would receive from a human consultant?

Question 23

What is a primary privacy concern related to the use of data warehouses and data mining by companies and governments?

Question 24

What are Managed Service Providers (MSP) considered in relation to Application Service Providers (ASP)?

Question 25

What was the estimated global market value for managed IT services in 2016?

Question 26

In the context of IT security, what is software and media piracy?

Question 27

Which company did Union Pacific (UP) railroad turn to for data warehouse technology to streamline its business operations?

Question 28

What is the first step in a company's security strategy to prevent costly computer problems?

Question 29

According to the text, what is a key difference between cloud/grid computing and outsourcing from ASPs?

Question 30

What is an enterprise portal?

Question 31

What is the typical indoor and outdoor range of a Wireless LAN (WLAN)?

Question 32

How many years did it take for Union Pacific's data warehouse system to pay for itself?

Question 33

What is the next goal for supercomputer speed, defined as quadrillions of computations per second?

Question 34

What type of information technology combines many databases across a whole company into one central database to support management decision-making?

Question 35

According to a CIO article, what was a lamented issue regarding basic security policies in companies?

Question 36

In the case of Captiva Software, cofounder Reynolds Bish made a successful bet on what premise?

Question 37

What type of software combines word processing, graphics, and page layout capabilities to allow companies to produce sales brochures and newsletters in-house?

Question 38

What percentage of Aetna's HR department size was reduced by shifting routine administrative tasks to their intranet?

Question 39

What is the primary difference between a Wide Area Network (WAN) and a Local Area Network (LAN)?

Question 40

Which type of management support system produces regularly scheduled reports and special reports based on summary data from the TPS?

Question 41

What is the primary risk associated with keylogging software?

Question 42

What is the main goal of technology management and planning within a company?

Question 43

According to the text, a recent survey of IT executives revealed that over what fraction expect a cyberattack in the near future?

Question 44

What is the role of a client application in a computer network?

Question 45

What is one of the main reasons for the increasing popularity of wireless networks?

Question 46

What type of data is collected over a period of time and processed together in a system known as batch processing?

Question 47

At Bristol-Meyers Squibb, how much of their time were company scientists spending searching multiple databases before a knowledge management project integrated them?

Question 48

What is a common way that outsiders get into company systems, according to the text?

Question 49

What kind of security threat does spam pose to a corporation, besides being a nuisance?

Question 50

According to the text, a recent estimate suggests that as much as 3.9 million of the original 21 million what are 'lost' on old hard drives and flash drives?