A. Malicious software (malware)
B. Hacker or cracker
C. Disgruntled employee
D. Auditors
C
A. Ring protection
B. Anti-malware
C. Maintenance hooks
D. Trusted paths
D
A. Fail-safe
B. Fail-secure
C. Fail-proof
D. Fail-closed
A
A. Cold spare
B. Warm spare
C. Hot spare
D. Archives
C
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
A
A. Data mirroring
B. Shadowing
C. Backup
D. Archiving
B
A. Full
B. Incremental
C. Differential
D. Increase the backup window so a full backup can be performed
C
A. Least privilege
B. Separation of duties
C. Fail-safe
D. Psychological acceptability
A
A. Destroyed
B. Re-categorized
C. Degaussed
D. Released
B
A. Job rank or title
B. Partnership with the security team
C. Role
D. Background investigation
D
A. Clipping level
B. Aggregation
C. XML Parsing
D. Inference
A
A. In real time
B. For historical purposes
C. For admissibility in court
D. In discerning patterns
A
A. Deletion
B. Degaussing
C. Destruction
D. Overwriting
C
A. Incident management
B. Problem management
C. Change management
D. Configuration management
B
A. Full disclosure information about the threat that the patch addresses is available
B. The patching process is documented
C. The production systems are backed up
D. An independent third party attests the validity of the patch
C
A. Law
B. Information systems
C. Analytical thought
D. The scientific method
A
A. Meyer’s principal of legal impunity
B. Criminalistic principals
C. IOCE/Group of 8 Nations principals for computer forensics
D. Locard’s principle of exchange
D
A. Be authentic, be redundant and be admissible.
B. Be complete, be authentic and be admissible.
C. Be complete, be redundant and be authentic.
D. Be redundant, be admissible and be complete
B
A. Documentation
B. Prosecution
C. Containment
D. Investigation
B
A. Criminal law
B. Civil law
C. Religious law
D. Administrative law
B
A. IOCE, MOM and SWGDE.
B. MOM, SWGDE and IOCE.
C. IOCE, SWGDE and ACPO.
D. ACPO, MOM and IOCE.
C
A. Collection, transport, testimony
B. Traceback, feedback, loopback
C. Detection, identification, notification
D. Confidentiality, integrity, availability
C
A. Comparing hash totals to the original source
B. Keeping good notes
C. Taking pictures
D. Encrypted keys
A
A. Must never be altered
B. Must be completely reproducible in a court of law
C. Must exist in only one country
D. Must have the least amount of contamination that is possible
D