Page 1383 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1383
A. All of the damage has been done. Turning the machine off
would not stop additional damage.
B. There is no other system that can replace this one if it is turned
off.
C. Too many users are logged in and using the system.
D. Valuable evidence in memory will be lost.
10. Hacktivists are motivated by which of the following factors?
(Choose all that apply.)
A. Financial gain
B. Thrill
C. Skill
D. Political beliefs
11. Which one of the following investigation types has the highest
standard of evidence?
A. Administrative
B. Civil
C. Criminal
D. Regulatory
12. During an operational investigation, what type of analysis might an
organization undertake to prevent similar incidents in the future?
A. Forensic analysis
B. Root-cause analysis
C. Network traffic analysis
D. Fagan analysis
13. What step of the Electronic Discovery Reference Model ensures
that information that may be subject to discovery is not altered?
A. Preservation
B. Production

