Tuesday, January 14, 2014

CIS 481-20: INTRO TO INFORM SECURITY CH12

  • Question 1

    2 out of 2 points
    __________ is the coherent application of methodical investigatory techniques to present evidence of crimes in a court or court-like setting.
    Selected Answer:
    Correct 
    Forensics
    Correct Answer:
    Correct Forensics
  • Question 2

    1 out of 1 points
    In the offline method of data acquisition for evidence gathering, a sector-by-sector copy of hard drives is made after the investigator has removed the power source in the target system.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 3

    2 out of 2 points
    ____ is used to respond to network change requests and network architectural design proposals.
    Selected Answer:
    Correct 
    Network connectivity RA
    Correct Answer:
    Correct Network connectivity RA
  • Question 4

    1 out of 1 points
    Evidentiary material (EM) is any information that could potentially support the organization's legal or policy-based case against a suspect.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 5

    2 out of 2 points
    _________ is the process of reviewing the use of a system to determine if misuse or malfeasance has occurred.
    Selected Answer:
    Correct 
    Auditing
    Correct Answer:
    Correct Auditing
  • Question 6

    2 out of 2 points
    The ____ process is designed to find and document the vulnerabilities that may be present because there are misconfigured systems in use within the organization.
    Selected Answer:
    Correct 
    platform security validation
    Correct Answer:
    Correct platform security validation
  • Question 7

    1 out of 1 points
    Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 8

    1 out of 1 points
    As threats evolve or new vulnerabilities in the systems emerge, the information security team must determine if a shift in the priorities of the organization’s security posture is required.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 9

    2 out of 2 points
    The ____ vulnerability assessment process is designed to find and document selected vulnerabilities that are likely to be present on the internal network of the organization.
    Selected Answer:
    Correct 
    intranet
    Correct Answer:
    Correct intranet
  • Question 10

    1 out of 1 points
    Chain of command is the detailed documentation of the collection, storage, transfer, and ownership of collected evidence from the crime scene through its presentation in court.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 11

    2 out of 2 points
    In the context of a security risk assessment, the ____ is a statement of the boundaries of the RA.
    Selected Answer:
    Correct 
    scope
    Correct Answer:
    Correct scope
  • Question 12

    1 out of 1 points
    Computer emergency response teams (CERTs) exist in varying forms around the world, including US-CERT which is often viewed as the definitive authority.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 13

    1 out of 1 points
    One key use of digital forensics is to perform root cause analysis, such as when the organization suspects that an attack was successful and they wish to learn the methodology used to gain unauthorized access or determine how pervasive and successful the attack was.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 14

    1 out of 1 points
    External monitoring entails collecting intelligence from various data sources, and then giving that intelligence context and meaning for use by decision makers within the organization. The objective of this monitoring is to provide early awareness of new and emerging threats, threat agents, vulnerabilities, and attacks to the organization.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 15

    2 out of 2 points
    ____ involves security personnel performing a set of security tests and evaluations that simulate attacks by a malicious external source (such as a hacker) in which the analyst usually tries to get as far as possible.
    Selected Answer:
    Correct 
    Penetration testing
    Correct Answer:
    Correct Penetration testing
  • Question 16

    2 out of 2 points
    The steps of the Internet vulnerability assessment include ____, which is when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.
    Selected Answer:
    Correct 
    Scanning
    Correct Answer:
    Correct Scanning
  • Question 17

    1 out of 1 points
    The digital forensics team must be able to demonstrate that any analyzed copy or image is a true and accurate replica of the source material. This is typically accomplished by usingcryptographic hash tools.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True

No comments:

Post a Comment