CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 6

• Question 31 A ____ is defined by the ICM as a disruption in the company’s business that occurs without warning and is likely to generate news coverage and may adversely impact employees, investors, customers, suppliers, and other stakeholders. • Question 32 Cross-training provides a mechanism to get everyone out of the crime scene and thus prevent contamination of possible evidentiary material. • Question 33 The ____ handles computer crimes that are categorized as felonies. • Question 34 The forensic tool ____ does extensive pre-processing of evidence items that recovers deleted files and extracts e-mail messages. • Question 35 ____ is used both for intrusion analysis and as part of evidence collection and analysis. • Question 36 ____ is the determination of the initial flaw or vulnerability that allowed an incident to occur. • Question 37 Most digital forensic teams have a prepacked field kit, also known as a(n) ____. • Question 38