The data on the affected system must be backed up so that it can be retrieved if it is damaged during incident response. The system backup can also be used for further investigations of the incident. Identify the stage of the incident response and handling process in which complete backup of the infected system is carried out?
A. Containment
B. Eradication
C. Incident recording
D. Incident investigation
Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The personal computer of the criminal in question was confiscated by the county police. Which of the following evidence will lead John in his investigation?
A. SAM file
B. Web serve log
C. Routing table list
D. Web browser history
The largest number of cyber-attacks are conducted by: A. Insiders
B. Outsiders
C. Business partners
D. Suppliers
Which of the following can be considered synonymous:
A. Hazard and Threat
B. Threat and Threat Agent
C. Precaution and countermeasure
D. Vulnerability and Danger
CERT members can provide critical support services to first responders such as:
A. Immediate assistance to victims
B. Consolidated automated service process management platform
C. Organizing spontaneous volunteers at a disaster site
D. A + C
The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs is called:
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
A software application in which advertising banners are displayed while the program is running that delivers ads to display pop-up windows or bars that appears on a computer screen or browser is called:
A. adware (spelled all lower case)
B. Trojan
C. RootKit
D. Virus
E. Worm
Authorized users with privileged access who misuse the corporate informational assets and directly affects the confidentiality, integrity, and availability of the assets are known as:
A. Outsider threats
B. Social Engineers
C. Insider threats
D. Zombies
Which of the following may be considered as insider threat(s):
A. An employee having no clashes with supervisors and coworkers
B. Disgruntled system administrators
C. An employee who gets an annual 7% salary raise
D. An employee with an insignificant technical literacy and business process knowledge
The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation is called:
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Policy