The other three choices are incorrect because they represent a state that is not accessible by the vulnerability testing tools. Generalized audit software or special utility programs can handle such events better.
146. What is oral testimony?
a.
Cumulative evidenceb.
Proffered evidencec.
Direct evidenced.
Negative evidenceThe other three choices are incorrect because they do not use oral testimony. Cumulative evidence is evidence introduced to prove a fact for which other evidence has already been introduced. Proffered evidence is evidence that a party seeks to introduce as evidence to prove or defeat some crime, claim, or defense. This can be pros or cons. Negative evidence is evidence that something did not happen or does not exist.
147. Which of the following phases of a security incident investigation process determines whether a computer crime has occurred?
a.
Initiating the investigationb.
Testing and validating the incident hypothesisc.
Analyzing the incidentd.
Presenting the evidenceThe correct order of the investigation process is gather facts (phase 1), interview witnesses (phase 1), develop incident hypothesis (phase 1), test and validate the hypothesis (phase 2), analyze (phase 3), and report the results to management and others (phase 4).
148. Which of the following investigative tools is
a.
Interviewsb.
Questionnairesc.
Forensic analysisd.
Computer analysis149. Which of the following methods is acceptable to handle computer equipment seized in a computer crime investigation?
a.
Exposing the magnetic media to radio wavesb.
Laying the magnetic media on top of electronic equipmentc.
Subjecting the magnetic media to forensic testingd.
Leaving the magnetic media in the trunk of a vehicle containing a radio unit150. To preserve the integrity of collected evidence in a criminal prosecution dealing with computer crime, who should
a.
A law enforcement staff trained in computersb.
A computer consultant with requisite technical experiencec.
A civilian witness with expertise in computersd.
A teenage hacker who is a computer expert