Mastering Malware Containment

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary step advisable for Bonney to contain the malware incident from spreading?

  • Leave it to the network administrators to handle
  • Call the legal department in the organization and inform about the incident
  • Complaint to police in a formal way regarding the incident
  • Turn off the infected machine (correct)

What is the next step carried out right after collecting the evidence in the forensics investigation process?

  • Set a Forensic lab
  • Send it to the nearby police station
  • Call Organizational Disciplinary Team
  • Create a Chain of Custody Document (correct)

What is the correct flow for setting up a Computer Forensics Lab?

  • Planning and budgeting, Physical location and structural design considerations, Work area considerations, Human resource considerations, Physical security recommendations, Forensics lab licensing (correct)
  • Work area considerations, Human resource considerations, Physical security recommendations, Forensics lab licensing, Planning and budgeting, Physical location and structural design considerations
  • Physical location and structural design considerations, Work area considerations, Human resource considerations, Physical security recommendations, Forensics lab licensing, Planning and budgeting
  • Human resource considerations, Physical security recommendations, Forensics lab licensing, Planning and budgeting, Physical location and structural design considerations, Work area considerations

What is the primary step advisable for Bonney to contain the malware incident from spreading?

<p>Turn off the infected machine (B)</p> Signup and view all the answers

What is the next step carried out right after collecting the evidence in the forensics investigation process?

<p>Create a Chain of Custody Document (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Mastering Computer Viruses & Malware
5 questions
Mastering Malware
30 questions

Mastering Malware

BeneficiaryJubilation avatar
BeneficiaryJubilation
Mastering Anti-Malware
3 questions

Mastering Anti-Malware

LucrativeMagenta avatar
LucrativeMagenta
Mastering Anti-Malware
3 questions

Mastering Anti-Malware

LucrativeMagenta avatar
LucrativeMagenta
Use Quizgecko on...
Browser
Browser