217. In a computer-related crime investigation, maintenance of evidence is important for which of the following reasons:
a.
To record the crimeb.
To collect the evidencec.
To protect the evidenced.
To avoid problems of proof217. d.
It is proper to maintain computer-related evidence. Special procedures are needed to avoid problems of proof caused by improper care and handling of such evidence. 218. An effective strategy to analyze indications to investigate the most suspicious activity is accomplished through which of the following?
a.
Using an Internet search engineb.
Creating a diagnosis matrixc.
Synchronizing the clocksd.
Filtering of the incident data218. d.
An incident indication analyst sees a large volume of data daily for analysis, which consumes large amounts of time. An effective strategy is to filter indications so that insignificant indications are not shown or only significant indications are shown to the analyst. 219. Which of the following is directly applicable to computer security incident prioritization?
a.
Gap-fit analysisb.
Sensitivity analysisc.
Option analysisd.
Business impact analysis219. d.
A fundamental concept of business continuity planning is business impact analysis (BIA), which refers to determining the impact of particular events. BIA information for an organization may be directly applicable to security incident prioritization.The other three choices are not related to security incident prioritization. Gap-fit analysis deals with comparing actual outcomes with expected outcomes. Sensitive analysis focuses on “what if” conditions. Option analysis deals with choices available or not available.
220. From a computer-forensic viewpoint, which of the following is
most useful in prosecution?a.
Disk imageb.
Standard file system backupc.
Deleted filesd.
File fragments220. a.
A disk image preserves all data on the disk, including deleted files and file fragments. A standard file system backup can capture information on existing files, which may be sufficient for handling many incidents, particularly those that are not expected to lead to prosecution. Both disk images and file system backups are valuable regardless of whether the attacker will be prosecuted because they permit the target to be restored while the investigation continues using the image or backup.221. Which of the following indications is
not associated with a network-based denial-of-service attack against a particular host?a.
Unexplained connection lossesb.
Packets with nonexistent destination addressesc.
Increased network bandwidth utilizationd.
Firewall and router log entries221. b.
Packets with nonexistent destination addresses are an example of possible indications for a network-based denial-of-service (DoS) attack against a network, not a host. The other choices are examples of indications for network-based DoS attacks against a particular host.222. Which of the following indications is
not associated with a malicious action such as root compromise of a host?a.
User reports of system unavailabilityb.
Highly unusual log messagesc.
Unexplained account usaged.
Increased resource utilization222. d.
“Increased resource utilization” is an example of possible indications of malicious action such as unauthorized data modification. The other choices are examples of possible indications of root compromise of a host.223. From a security incident viewpoint, countermeasures and controls
cannot do which of the following?a.
Preventb.
Detectc.
Respondd.
Recover223. c.
Countermeasures and controls prevent, detect, and recover from security incidents, not respond to them. Incident response emphasizes interactions with outside parties, such as the media/press, law enforcement authorities, and incident reporting organizations. It is not easy to exercise control over these outside parties. 224. Which of the following forensic tools and techniques are useful for complying with regulatory requirements?
a.
Operational troubleshootingb.
Data recoveryc.
Due diligenced.
Data acquisition