Joshua Villy
Test por , creado hace más de 1 año

1 CSI270 Test sobre Quiz 9, creado por Joshua Villy el 08/05/2013.

181
0
0
Joshua Villy
Creado por Joshua Villy hace alrededor de 11 años
Cerrar

Quiz 9

Pregunta 1 de 25

1

The categories of laws in the U.S. are:

Selecciona una de las siguientes respuestas posibles:

  • Civil, criminal, administrative, and family

  • Intellectual, privacy, and computer crime

  • Criminal, civil, and administrative

  • Criminal, civil, and family

Explicación

Pregunta 2 de 25

1

Trademarks, copyrights, and patents are all a part of:

Selecciona una de las siguientes respuestas posibles:

  • Intellectual property law

  • Civil law

  • Administrative law

  • Private property law

Explicación

Pregunta 3 de 25

1

An organization has developed a new type of printer. What approach should the organization take to protect this invention?

Selecciona una de las siguientes respuestas posibles:

  • Trade secret

  • Copyright

  • Trademark

  • Patent

Explicación

Pregunta 4 de 25

1

A financial services organization is required to protect information about its customers. Which of these laws requires this protection:

Selecciona una de las siguientes respuestas posibles:

  • HIPAA

  • COPPA

  • CALEA

  • GLBA

Explicación

Pregunta 5 de 25

1

A suspect has been forging credit cards with the purpose of stealing money from their owners through ATM withdrawals. Under which U.S. law is this suspect most likely to be prosecuted?

Selecciona una de las siguientes respuestas posibles:

  • Computer Fraud and Abuse Act

  • Access Device Fraud

  • Computer Security Act

  • Sarbanes-Oxley Act

Explicación

Pregunta 6 de 25

1

Which U.S. law gives law enforcement organizations greater powers to search telephone, e-mail, banking, and other records?

Selecciona una de las siguientes respuestas posibles:

  • Patriot Act

  • Communications Assistance for Law Enforcement Act

  • Federal Information Security Management Act

  • Gramm-Leach-Bliley Act

Explicación

Pregunta 7 de 25

1

The Payment Card Industry Data Security Standard (PCI DSS) requires encryption of credit card in which circumstances:

Selecciona una de las siguientes respuestas posibles:

  • Stored in databases, stored in flat files, and transmitted over public and private networks

  • Stored in databases, and transmitted over public networks

  • Stored in databases, stored in flat files, and transmitted over public networks

  • Stored in databases, and transmitted over public and private networks

Explicación

Pregunta 8 de 25

1

A security incident as defined as:

Selecciona una de las siguientes respuestas posibles:

  • Unauthorized entry

  • Exposure of sensitive information

  • Theft of sensitive information

  • Violation of security policy

Explicación

Pregunta 9 de 25

1

The phases of a comprehensive security incident plan are:

Selecciona una de las siguientes respuestas posibles:

  • Declaration, triage, investigation, analysis, containment, recovery, debriefing

  • Investigation, analysis, containment, recovery, debriefing

  • Declaration, triage, containment, recovery, debriefing

  • Declaration, triage, investigation, analysis, documentation, containment, recovery, debriefing

Explicación

Pregunta 10 de 25

1

A security manager has discovered that sensitive information stored on a server has been compromised. The organization is required by law to notify law enforcement. What should the security manager do first to preserve evidence on the server:

Selecciona una de las siguientes respuestas posibles:

  • Disconnect power to the server

  • Back up the server

  • Shut down the server

  • Notify management

Explicación

Pregunta 11 de 25

1

All of the following statements about a security incident plan are correct EXCEPT:

Selecciona una de las siguientes respuestas posibles:

  • The plan should be tested annually

  • The plan should be reviewed annually

  • The plan should be published annually

  • Training on plan procedures should be performed annually

Explicación

Pregunta 12 de 25

1

The purpose of a security incident debrief is all of the following EXCEPT:

Selecciona una de las siguientes respuestas posibles:

  • Review of log files

  • Review of technical architecture

  • Review of operational procedures

  • Review of technical controls

Explicación

Pregunta 13 de 25

1

Why would a forensic examiner wish to examine a computer’s surroundings during a forensic investigation?

Selecciona una de las siguientes respuestas posibles:

  • Evaluate cleanliness

  • Interrogate the suspect

  • Search for DNA evidence

  • Search for any removable media and documents

Explicación

Pregunta 14 de 25

1

A case of employee misconduct that is the subject of a forensic investigation will likely result in a court proceeding. What should included in the forensic investigation:

Selecciona una de las siguientes respuestas posibles:

  • Legible notes on all activities

  • Law enforcement investigation

  • Chain of custody for all evidence

  • Dual custody for all evidence

Explicación

Pregunta 15 de 25

1

The (ISC)2 code of ethics includes all of the following EXCEPT:

Selecciona una de las siguientes respuestas posibles:

  • Provide diligent and competent service to principals

  • Protect society and the infrastructure

  • Act honorably, honestly, justly, responsibly, and legally

  • Advance and protect the profession

Explicación

Pregunta 16 de 25

1

A security manager has been asked to investigate employee behavior on the part of a senior manager. The investigation has shown that the subject has suffered a serious lapse in judgment and has violate the organization’s code of conduct. The security manager has been asked to keep the results of the investigation a secret. How should the security manager respond?

Selecciona una de las siguientes respuestas posibles:

  • Leak the results of the investigation to the media

  • Cover up the results of the investigation

  • Deliver the results of the investigation a recommendations for next steps to his superiors

  • Notify law enforcement

Explicación

Pregunta 17 de 25

1

A forensics investigator has been asked to examine the workstation used by an employee who has been known to misbehave in the past. This investigation is related to more potential misconduct. What approach should the investigator take in this new investigation?

Selecciona una de las siguientes respuestas posibles:

  • Approach this investigation objectively, without regard to the history of this employee’s conduct

  • Approach this investigation subjectively, given the history of this employee’s conduct

  • Assume the employee is guilty and search for evidence to support this

  • Assume the employee is innocent and search for evidence to refute this

Explicación

Pregunta 18 de 25

1

The allegation that an employee has violated company policy by downloading child pornography onto a company workstation should result in:

Selecciona una de las siguientes respuestas posibles:

  • Notification of affected customers

  • Termination of the employee

  • The declaration of a security incident

  • A forensic investigation and possible disciplinary action

Explicación

Pregunta 19 de 25

1

An organization has developed its first-ever computer security incident response procedure. What type of test should be undertaken first?

Selecciona una de las siguientes respuestas posibles:

  • Parallel test

  • Simulation

  • Walkthrough

  • Document review

Explicación

Pregunta 20 de 25

1

An organization’s security incident management strategy consists of response procedures to be used when an incident occurs. What other measures should the organization undertake:

Selecciona una de las siguientes respuestas posibles:

  • None

  • Develop proactive procedures to aid in incident prevention

  • Train selected personnel on incident response procedures

  • Partner with law enforcement on incident response procedures

Explicación

Pregunta 21 de 25

1

The purpose of the containment step in a security incident response plan is:

Selecciona una de las siguientes respuestas posibles:

  • To prevent the spread of the incident

  • To recover the affected system to its pre-incident state

  • To isolate the system

  • To collect evidence for possible disciplinary action or prosecution

Explicación

Pregunta 22 de 25

1

The U.S. law that made sending unsolicited commercial e-mail illegal is:

Selecciona una de las siguientes respuestas posibles:

  • STOP-SPAM

  • DMCA

  • Controlling The Assault of Non-Solicited Pornography and Marketing Act

  • Computer Security Act

Explicación

Pregunta 23 de 25

1

The purpose of administrative laws in the U.S. is:

Selecciona una de las siguientes respuestas posibles:

  • To define courtroom and law enforcement procedures

  • To define activities such as assault, arson, theft, burglary, bribery, and perjury

  • To define contract, tort, property, employment, and corporate law

  • To regulate the operation of U.S. government agencies

Explicación

Pregunta 24 de 25

1

The U.S. Code defines:

Selecciona una de las siguientes respuestas posibles:

  • Both criminal and civil laws

  • Administrative laws

  • Civil laws

  • Criminal laws

Explicación

Pregunta 25 de 25

1

The type of intellectual property law that protects a written work is known as:

Selecciona una de las siguientes respuestas posibles:

  • Copyright

  • Trademark

  • Patent

  • Service mark

Explicación