Columbia International University
Latest uploads at Columbia International University. Looking for notes at Columbia International University? We have lots of notes, study guides and study notes available for your school.
-
409
- 0
-
30
All courses for Columbia International University
Latest notes & summaries Columbia International University
The Computer Security Act of 1987 
Passed to improve the security and privacy of sensitive information in federal computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities that house sensitive information. 
 
 
 
The Foreign Intelligence Surveillance Act of 1978 (FISA) 
A law that allows for collection of "foreign intelligence information" between foreign powers and ag...
The Federal Privacy Act of 1974 
Establishes a code of information-handling practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by U.S. federal agencies. A system of records is a group of records under the control of an agency from which information is retrieved by the name of the individual or by some identifier assigned to the individual. 
 
 
 
The Privacy Protection Act of 1980 
Protects journali...
Malware forensics is also known as internet forensics. 
 
A True 
B False 
B 
 
 
 
The Privacy Protection Act (PPA) of 1980 protects journalists from being required to turn over to law enforcement any work product or documentary material, including sources, before it is disseminated to the public. 
 
A True 
B False 
A 
 
 
 
The term testimonial evidence refers to the process of examining malicious computer code. 
 
A True 
B False 
B 
 
 
 
Evidence need not be locked if it is at a police sta...
expert report 
A formal document prepared by a forensics specialist to document an investigation, including a list of all tests conducted as well as the specialist's own curriculum vitae (CV). Anything the specialist plans to testify about at a trial must be included in the expert report. 
 
 
 
Testimonial evidence 
Information that forensic specialists use to support or interpret real or documentary evidence; for example, to demonstrate that the fingerprints found on a keyboard are those of a...
WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane |272 questions and answers
Microsoft Certification exam |60 questions fully solved.
You are always responsible for: 
1 Data 
2 Endpoints 
3 Accounts 
4 Access 
 
 
 
Azure Security Center tiers: 
Free 
Standard - $15 a month per node 
 
 
 
Authentication (AuthN) 
Process of establishing identity of a person or service. Includes act of challenging party for their creds. Establishes they ARE who they say they are. 
 
 
 
Authorization (AuthZ) 
Establishes what access you are allowed 
 
 
 
Azure MFA for global admins is: 
Free 
 
 
 
Azure MFA for non-global admins is: 
Not free...
What are some computing services offered by a Cloud Provider? 
•Compute power - e.g. Servers or web applications 
•Storage - e.g. Files and Databases 
•Networking - e.g. secure connections between the cloud provider and on-premises. 
•Analytics - e.g. visual telemetry and performance data 
 
 
 
Jim the systems admin at a fictitious company is an absolute control freak! From the list below, choose the most appropriate cloud solution for him: 
a). Virtual Machines 
b). Containers 
c). Ser...
Save File as "My Word" in the word challenge folder. 
file, save as, browse, desktop, file name, challenge, new folder, enter name of folder, file name, My word 
 
 
 
apply a page border to section 1 
design, page border, enter features, apply to: this section, ok 
 
 
 
Insert the Banded cover page 
insert, pages, cover, banded 
 
 
 
Apply the Banded Header. 
Do not display the Header on Page 1. Insert the into the Section 1 document Header. 
Configure Text Wrapping to Tight. 
Place the lo...
What products / services are included when you purchase Microsoft 365 Enterprise? 
Office 365 Enterprise, Windows 10 Enterprise, & Enterprise Mobility + Security (EMS) 
 
 
 
What does Enterprise Mobility + Security (EMS) include? 
Microsoft Intune, Azure AD Premium, and Azure Rights Management. 
 
 
 
Microsoft 365 Enterprise has the following plans, E2, E4, & E8 
No, Microsoft 365 Enterprise is comprised of plan E1, E3, and E5. 
 
 
 
What are the key differences between Microsoft 365 Enterpri...