a.
Access mechanismb.
Target mechanismc.
Transmission mechanismd.
Incident mechanism201. What is incorrectly classifying a malicious activity as a benign activity called?
a.
False negativeb.
False positivec.
False warningsd.
False alerts202. Which of the following computer and network data analysis methods dealing with computer-incident purposes helps identify policy violations?
a.
Operational troubleshootingb.
Log monitoringc.
Data recoveryd.
Data acquisitionOperational troubleshooting is incorrect because it applies to finding the virtual and physical location of a host with an incorrect network configuration, resolving a functional problem with an application, and recording and reviewing the current operating system and application configuration settings for a host.
Data recovery is incorrect because data recovery tools can recover lost data from systems. This includes data that has been accidentally or purposely deleted, overwritten, or otherwise modified.
Data acquisition is incorrect because it deals with tools to acquire data from hosts that are being redeployed or retired. For example, when a user leaves an organization, the data from the user’s workstation can be acquired and stored in case the data is needed in the future. The workstation’s media can then be sanitized to remove all the original user’s data.
203. Which of the following is
a.
Security event management softwareb.
Protocol analyzerc.
Log filtering toold.
Visualization toolSecurity event management software is incorrect because it is capable of importing security event information from various network traffic-related security event data sources (e.g., IDS logs and firewall logs) and correlating events among the sources.
Log filtering tool is incorrect because it helps an analyst to examine only the events that are most likely to be of interest. Visualization tool is incorrect because it presents security event data in a graphical format.
204. What is a technique for concealing or destroying data so that others
a.
Antiforensicb.
Steganographyc.
Digital forensicd.
Forensic science205. A search warrant is required:
a.
Before the allegation has been substantiatedb.
After establishing the probable cause(s)c.
Before identifying the number of investigators neededd.
After seizing the computer and related equipment