Presentation is loading. Please wait.

Presentation is loading. Please wait.

每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered.

Similar presentations


Presentation on theme: "每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered."— Presentation transcript:

1 每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered to represent? A Hearsay B Irrelevant C Incomplete D Secondary A

2 每时每刻 可信安全 2 Which of the following categories of hackers poses the greatest threat? A Disgruntled employees B Student hackers C Criminal hackers D Corporate spies A

3 每时每刻 可信安全 3 Under the principle of culpable negligence, executives can be held liable for losses that result from computer system breaches if: A the company is not a multi-national company. B they have not exercised due care protecting computing resources. C they have failed to properly insure computer resources against loss. D the company does not prosecute the hacker that caused the breach. B

4 每时每刻 可信安全 4 Once an intrusion into your organization's information system has been detected, which of the following actions should be performed first? A Eliminate all means of intruder access. B Contain the intrusion. C Determine to what extent systems and data are compromised. D Communicate with relevant parties C

5 每时每刻 可信安全 5 When should a post-mortem review meeting be held after an intrusion has been properly taken care of? A Within the first three months after the investigation of the intrusion is completed. B Within the first week after prosecution of intruders have taken place, whether successful or not. C Within the first month after the investigation of the intrusion is completed. D Within the first week of completing the investigation of the intrusion D

6 每时每刻 可信安全 6 Which element must computer evidence have to be admissible in court? A It must be relevant. B It must be annotated. C It must be printed. D It must contain source code A

7 每时每刻 可信安全 7 When companies come together to work in an integrated manner such as extranets, special care must be taken to ensure that each party promises to provide the necessary level of protection, liability and responsibility. These aspects should be defined in the contracts that each party signs. What describes this type of liability? A Cascade liabilities B Downstream liabilities C Down-flow liabilities D Down-set liabilities B

8 每时每刻 可信安全 8 Which of the following is not a problem regarding computer investigation issues? A Information is intangible. B Evidence is difficult to gather. C Computer-generated records are only considered secondary evidence, thus are not as reliable as best evidence. D In many instances, an expert or specialist is required C

9 每时每刻 可信安全 9 In order to preserve a proper chain of custody of evidence: A Evidence has to be collected following predefined procedures in accordance with all laws and legal regulations. B Law enforcement officials should be contacted for advice on how and when to collect critical information. C Verifiable documentation indicating the sequence of individuals who have handled a piece of evidence should be available. D Log files containing information regarding an intrusion are retained for at least as long as normal business records, and longer in the case of an ongoing investigation C

10 每时每刻 可信安全 10Which of the following statements regarding trade secrets is false? A For a company to have a resource qualify as a trade secret, it must provide the company with some type of competitive value or advantage. B The Trade Secret Law normally protects the expression of the idea of the resource. C Many companies require their employees to sign nondisclosure agreements regarding the protection of their trade secrets. D A resource can be protected by law if it is not generally known and if it requires special skill, ingenuity, and/or expenditure of money and effort to develop it B

11 每时每刻 可信安全 The deliberate planting of apparent flaws in a system for the purpose of detecting attempted penetrations or confusing an intruder about which flaws to exploit is called: A alteration. B investigation. C re-direction. D enticement D

12 每时每刻 可信安全 12 Phreakers are hackers who specialize in telephone fraud. What type of telephone fraud simulates the tones of coins being deposited into a payphone? A Red Boxes B Blue Boxes C White Boxes D Black Boxes A

13 每时每刻 可信安全 13 To understand the 'whys' in crime, many times it is necessary to understand MOM. Which of the following is not a component of MOM? A Opportunities B Methods C Motivation D Means B


Download ppt "每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered."

Similar presentations


Ads by Google