3. In general, which of the following evidence is
a.
Hearsay evidenceb.
Primary evidencec.
Material evidenced.
Substantive evidenceThe other three choices are admissible in a court of law. Primary evidence is original and best evidence. It is confined to documentary evidence and applies to proof of a writing’ content. Material evidence is evidence that was relevant to prove a disputed consequential fact and is also used to say evidence having some weight. Substantive evidence is evidence that is admitted to prove the significance of the party’s case rather than to attack the credibility of an opposing witness.
Similarly, business documents (for example, sales orders and purchase orders) created during regular business transactions are considered admissible in a court of law. Another example is photographs represent hearsay evidence but are considered admissible if they are properly authenticated by witnesses who are familiar with the subject.
4. All of the following are the primary elements of a security incident triad
except:a.
Detectb.
Respondc.
Reportd.
RecoverThe “report” is a secondary element and is a byproduct of the primary elements. Reporting can be done internally to management, which is required, and externally to public (for example, media/press, law enforcement authorities, and incident reporting organizations), which is optional. How much external reporting is done depends on the organization’s management openness to report due to adverse publicity and reputation risk involved from bad security breaches.
5. Which of the following makes the security incident event correlation work much easier and faster?
a.
Distributed loggingb.
Local loggingc.
Centralized loggingd.
Centralized monitoring6. Networks and systems profiling is a technical measure for aiding in incident analysis and is achieved through which of the following means?
1.
Running file integrity checking software on hosts2.
Monitoring network bandwidth usage3.
Monitoring host resource usage4.
Determining the average and peak usage levelsa.
2 onlyb.
3 onlyc.
4 onlyd.
1, 2, 3, and 47. The incident response team should discuss which of the following containment strategies with its legal department to determine if it is feasible?
a.
Full containmentb.
Phase containmentc.
Partial containmentd.
Delayed containment