Joshua Villy
Quiz von , erstellt am more than 1 year ago

1 CSI270 Quiz am Quiz 9, erstellt von Joshua Villy am 08/05/2013.

181
0
0
Joshua Villy
Erstellt von Joshua Villy vor etwa 11 Jahre
Schließen

Quiz 9

Frage 1 von 25

1

The categories of laws in the U.S. are:

Wähle eine der folgenden:

  • Civil, criminal, administrative, and family

  • Intellectual, privacy, and computer crime

  • Criminal, civil, and administrative

  • Criminal, civil, and family

Erklärung

Frage 2 von 25

1

Trademarks, copyrights, and patents are all a part of:

Wähle eine der folgenden:

  • Intellectual property law

  • Civil law

  • Administrative law

  • Private property law

Erklärung

Frage 3 von 25

1

An organization has developed a new type of printer. What approach should the organization take to protect this invention?

Wähle eine der folgenden:

  • Trade secret

  • Copyright

  • Trademark

  • Patent

Erklärung

Frage 4 von 25

1

A financial services organization is required to protect information about its customers. Which of these laws requires this protection:

Wähle eine der folgenden:

  • HIPAA

  • COPPA

  • CALEA

  • GLBA

Erklärung

Frage 5 von 25

1

A suspect has been forging credit cards with the purpose of stealing money from their owners through ATM withdrawals. Under which U.S. law is this suspect most likely to be prosecuted?

Wähle eine der folgenden:

  • Computer Fraud and Abuse Act

  • Access Device Fraud

  • Computer Security Act

  • Sarbanes-Oxley Act

Erklärung

Frage 6 von 25

1

Which U.S. law gives law enforcement organizations greater powers to search telephone, e-mail, banking, and other records?

Wähle eine der folgenden:

  • Patriot Act

  • Communications Assistance for Law Enforcement Act

  • Federal Information Security Management Act

  • Gramm-Leach-Bliley Act

Erklärung

Frage 7 von 25

1

The Payment Card Industry Data Security Standard (PCI DSS) requires encryption of credit card in which circumstances:

Wähle eine der folgenden:

  • Stored in databases, stored in flat files, and transmitted over public and private networks

  • Stored in databases, and transmitted over public networks

  • Stored in databases, stored in flat files, and transmitted over public networks

  • Stored in databases, and transmitted over public and private networks

Erklärung

Frage 8 von 25

1

A security incident as defined as:

Wähle eine der folgenden:

  • Unauthorized entry

  • Exposure of sensitive information

  • Theft of sensitive information

  • Violation of security policy

Erklärung

Frage 9 von 25

1

The phases of a comprehensive security incident plan are:

Wähle eine der folgenden:

  • Declaration, triage, investigation, analysis, containment, recovery, debriefing

  • Investigation, analysis, containment, recovery, debriefing

  • Declaration, triage, containment, recovery, debriefing

  • Declaration, triage, investigation, analysis, documentation, containment, recovery, debriefing

Erklärung

Frage 10 von 25

1

A security manager has discovered that sensitive information stored on a server has been compromised. The organization is required by law to notify law enforcement. What should the security manager do first to preserve evidence on the server:

Wähle eine der folgenden:

  • Disconnect power to the server

  • Back up the server

  • Shut down the server

  • Notify management

Erklärung

Frage 11 von 25

1

All of the following statements about a security incident plan are correct EXCEPT:

Wähle eine der folgenden:

  • The plan should be tested annually

  • The plan should be reviewed annually

  • The plan should be published annually

  • Training on plan procedures should be performed annually

Erklärung

Frage 12 von 25

1

The purpose of a security incident debrief is all of the following EXCEPT:

Wähle eine der folgenden:

  • Review of log files

  • Review of technical architecture

  • Review of operational procedures

  • Review of technical controls

Erklärung

Frage 13 von 25

1

Why would a forensic examiner wish to examine a computer’s surroundings during a forensic investigation?

Wähle eine der folgenden:

  • Evaluate cleanliness

  • Interrogate the suspect

  • Search for DNA evidence

  • Search for any removable media and documents

Erklärung

Frage 14 von 25

1

A case of employee misconduct that is the subject of a forensic investigation will likely result in a court proceeding. What should included in the forensic investigation:

Wähle eine der folgenden:

  • Legible notes on all activities

  • Law enforcement investigation

  • Chain of custody for all evidence

  • Dual custody for all evidence

Erklärung

Frage 15 von 25

1

The (ISC)2 code of ethics includes all of the following EXCEPT:

Wähle eine der folgenden:

  • Provide diligent and competent service to principals

  • Protect society and the infrastructure

  • Act honorably, honestly, justly, responsibly, and legally

  • Advance and protect the profession

Erklärung

Frage 16 von 25

1

A security manager has been asked to investigate employee behavior on the part of a senior manager. The investigation has shown that the subject has suffered a serious lapse in judgment and has violate the organization’s code of conduct. The security manager has been asked to keep the results of the investigation a secret. How should the security manager respond?

Wähle eine der folgenden:

  • Leak the results of the investigation to the media

  • Cover up the results of the investigation

  • Deliver the results of the investigation a recommendations for next steps to his superiors

  • Notify law enforcement

Erklärung

Frage 17 von 25

1

A forensics investigator has been asked to examine the workstation used by an employee who has been known to misbehave in the past. This investigation is related to more potential misconduct. What approach should the investigator take in this new investigation?

Wähle eine der folgenden:

  • Approach this investigation objectively, without regard to the history of this employee’s conduct

  • Approach this investigation subjectively, given the history of this employee’s conduct

  • Assume the employee is guilty and search for evidence to support this

  • Assume the employee is innocent and search for evidence to refute this

Erklärung

Frage 18 von 25

1

The allegation that an employee has violated company policy by downloading child pornography onto a company workstation should result in:

Wähle eine der folgenden:

  • Notification of affected customers

  • Termination of the employee

  • The declaration of a security incident

  • A forensic investigation and possible disciplinary action

Erklärung

Frage 19 von 25

1

An organization has developed its first-ever computer security incident response procedure. What type of test should be undertaken first?

Wähle eine der folgenden:

  • Parallel test

  • Simulation

  • Walkthrough

  • Document review

Erklärung

Frage 20 von 25

1

An organization’s security incident management strategy consists of response procedures to be used when an incident occurs. What other measures should the organization undertake:

Wähle eine der folgenden:

  • None

  • Develop proactive procedures to aid in incident prevention

  • Train selected personnel on incident response procedures

  • Partner with law enforcement on incident response procedures

Erklärung

Frage 21 von 25

1

The purpose of the containment step in a security incident response plan is:

Wähle eine der folgenden:

  • To prevent the spread of the incident

  • To recover the affected system to its pre-incident state

  • To isolate the system

  • To collect evidence for possible disciplinary action or prosecution

Erklärung

Frage 22 von 25

1

The U.S. law that made sending unsolicited commercial e-mail illegal is:

Wähle eine der folgenden:

  • STOP-SPAM

  • DMCA

  • Controlling The Assault of Non-Solicited Pornography and Marketing Act

  • Computer Security Act

Erklärung

Frage 23 von 25

1

The purpose of administrative laws in the U.S. is:

Wähle eine der folgenden:

  • To define courtroom and law enforcement procedures

  • To define activities such as assault, arson, theft, burglary, bribery, and perjury

  • To define contract, tort, property, employment, and corporate law

  • To regulate the operation of U.S. government agencies

Erklärung

Frage 24 von 25

1

The U.S. Code defines:

Wähle eine der folgenden:

  • Both criminal and civil laws

  • Administrative laws

  • Civil laws

  • Criminal laws

Erklärung

Frage 25 von 25

1

The type of intellectual property law that protects a written work is known as:

Wähle eine der folgenden:

  • Copyright

  • Trademark

  • Patent

  • Service mark

Erklärung