Computer Forensics Chain of Evidence Quiz

BelovedYtterbium avatar
BelovedYtterbium
·
·
Download

Start Quiz

Study Flashcards

16 Questions

In the context of business continuity planning, what should a company do to ensure the protection of personnel?

Review architectural plans to determine the number of emergency exits

For IT services delivered from a Tier 4 data center, what failure should the IT manager be concerned with when preparing a Business Continuity Plan?

Power failure

According to ISO 27001 and 27002 standards, when can management responsibilities be defined?

Only when assets are clearly defined

Which technology would be the MOST cost-effective reactive control for protecting personnel in public areas?

Supplying a duress alarm for personnel exposed to the public

What is the most critical factor to consider to ensure the effectiveness of security controls?

Continuous testing of controls

What should be the initial step to preserve evidence when a desktop computer is involved in a security incident?

Starting documentation

During forensic analysis, what is the most crucial action when trying to determine the purpose of an unknown application?

Isolating the system from the network

What does a Business Continuity Plan (BCP) provide in the event of a disaster?

Protection from loss of organizational resources

When is a Business Continuity Plan (BCP) considered valid?

When validated through realistic exercises

Which aspect must recovery strategies in Disaster Recovery Planning (DRP) be in sync with?

Business continuity tests

What is the next step following completion of a Business Impact Analysis (BIA) according to Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) best practices?

Identify and select recovery strategies

During a vulnerability test on an Information System (IS), what is the primary objective?

Evaluate the effectiveness of security controls

Who must approve modifications to an organization's production infrastructure configuration?

Change control board

What is the critical aspect when implementing controls in a heterogeneous end-point network for an organization?

Hosts being able to establish network communications

What does a Denial of Service (DoS) attack typically aim to achieve?

Delay or disrupt services for legitimate users

What is one essential goal of testing an organization's Business Continuity Plan/Disaster Recovery Plan (BCP/DRP)?

Test the organization's ability to recover its operations

Test your knowledge on protecting the chain of evidence in computer forensics. Questions range from actions to take when a desktop computer is involved to ensuring evidence integrity throughout the investigation process.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser