Computer Forensics Chain of Evidence Quiz
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In the context of business continuity planning, what should a company do to ensure the protection of personnel?

  • Ensure the fire prevention and detection systems are not working properly
  • Conduct a gap analysis of new facilities against existing security requirements
  • Review architectural plans to determine the number of emergency exits (correct)
  • Revise the Disaster Recovery and Business Continuity (DR/BC) plan

For IT services delivered from a Tier 4 data center, what failure should the IT manager be concerned with when preparing a Business Continuity Plan?

  • Network failure
  • Power failure (correct)
  • Storage failure
  • Application failure

According to ISO 27001 and 27002 standards, when can management responsibilities be defined?

  • Only when assets are clearly defined (correct)
  • Only when controls are put in place
  • Only when procedures are defined
  • Only when standards are defined

Which technology would be the MOST cost-effective reactive control for protecting personnel in public areas?

<p>Supplying a duress alarm for personnel exposed to the public (B)</p> Signup and view all the answers

What is the most critical factor to consider to ensure the effectiveness of security controls?

<p>Continuous testing of controls (C)</p> Signup and view all the answers

What should be the initial step to preserve evidence when a desktop computer is involved in a security incident?

<p>Starting documentation (B)</p> Signup and view all the answers

During forensic analysis, what is the most crucial action when trying to determine the purpose of an unknown application?

<p>Isolating the system from the network (A)</p> Signup and view all the answers

What does a Business Continuity Plan (BCP) provide in the event of a disaster?

<p>Protection from loss of organizational resources (B)</p> Signup and view all the answers

When is a Business Continuity Plan (BCP) considered valid?

<p>When validated through realistic exercises (D)</p> Signup and view all the answers

Which aspect must recovery strategies in Disaster Recovery Planning (DRP) be in sync with?

<p>Business continuity tests (A)</p> Signup and view all the answers

What is the next step following completion of a Business Impact Analysis (BIA) according to Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) best practices?

<p>Identify and select recovery strategies (D)</p> Signup and view all the answers

During a vulnerability test on an Information System (IS), what is the primary objective?

<p>Evaluate the effectiveness of security controls (C)</p> Signup and view all the answers

Who must approve modifications to an organization's production infrastructure configuration?

<p>Change control board (A)</p> Signup and view all the answers

What is the critical aspect when implementing controls in a heterogeneous end-point network for an organization?

<p>Hosts being able to establish network communications (C)</p> Signup and view all the answers

What does a Denial of Service (DoS) attack typically aim to achieve?

<p>Delay or disrupt services for legitimate users (B)</p> Signup and view all the answers

What is one essential goal of testing an organization's Business Continuity Plan/Disaster Recovery Plan (BCP/DRP)?

<p>Test the organization's ability to recover its operations (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser