Question 1
__________ is the coherent application of methodical investigatory techniques to present evidence of crimes in a court or court-like setting.Selected Answer: 
 ForensicsCorrect Answer: 
 ForensicsQuestion 2
In the offline method of data acquisition for evidence gathering, a sector-by-sector copy of hard drives is made after the investigator has removed the power source in the target system.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 3
____ is used to respond to network change requests and network architectural design proposals.Selected Answer: 
 Network connectivity RACorrect Answer: 
 Network connectivity RAQuestion 4
Evidentiary material (EM) is any information that could potentially support the organization's legal or policy-based case against a suspect.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 5
_________ is the process of reviewing the use of a system to determine if misuse or malfeasance has occurred.Selected Answer: 
 AuditingCorrect Answer: 
 AuditingQuestion 6
The ____ process is designed to find and document the vulnerabilities that may be present because there are misconfigured systems in use within the organization.Selected Answer: 
 platform security validationCorrect Answer: 
 platform security validationQuestion 7
Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 8
As threats evolve or new vulnerabilities in the systems emerge, the information security team must determine if a shift in the priorities of the organization’s security posture is required.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 9
The ____ vulnerability assessment process is designed to find and document selected vulnerabilities that are likely to be present on the internal network of the organization.Selected Answer: 
 intranetCorrect Answer: 
 intranetQuestion 10
Chain of command is the detailed documentation of the collection, storage, transfer, and ownership of collected evidence from the crime scene through its presentation in court.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 11
In the context of a security risk assessment, the ____ is a statement of the boundaries of the RA.Selected Answer: 
 scopeCorrect Answer: 
 scopeQuestion 12
Computer emergency response teams (CERTs) exist in varying forms around the world, including US-CERT which is often viewed as the definitive authority.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 13
One key use of digital forensics is to perform root cause analysis, such as when the organization suspects that an attack was successful and they wish to learn the methodology used to gain unauthorized access or determine how pervasive and successful the attack was.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 14
External monitoring entails collecting intelligence from various data sources, and then giving that intelligence context and meaning for use by decision makers within the organization. The objective of this monitoring is to provide early awareness of new and emerging threats, threat agents, vulnerabilities, and attacks to the organization.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 15
____ involves security personnel performing a set of security tests and evaluations that simulate attacks by a malicious external source (such as a hacker) in which the analyst usually tries to get as far as possible.Selected Answer: 
 Penetration testingCorrect Answer: 
 Penetration testingQuestion 16
The steps of the Internet vulnerability assessment include ____, which is when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.Selected Answer: 
 ScanningCorrect Answer: 
 ScanningQuestion 17
The digital forensics team must be able to demonstrate that any analyzed copy or image is a true and accurate replica of the source material. This is typically accomplished by usingcryptographic hash tools.Selected Answer: 
 TrueCorrect Answer: 
 True
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH12
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment