Page 1383 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1383

A.  All of the damage has been done. Turning the machine off
                        would not stop additional damage.

                    B.  There is no other system that can replace this one if it is turned

                        off.

                    C.  Too many users are logged in and using the system.

                    D.  Valuable evidence in memory will be lost.

              10.  Hacktivists are motivated by which of the following factors?
                    (Choose all that apply.)

                    A.  Financial gain

                    B.  Thrill

                    C.  Skill

                    D.  Political beliefs


               11.  Which one of the following investigation types has the highest
                    standard of evidence?

                    A.  Administrative

                    B.  Civil

                    C.  Criminal

                    D.  Regulatory

               12.  During an operational investigation, what type of analysis might an
                    organization undertake to prevent similar incidents in the future?

                    A.  Forensic analysis


                    B.  Root-cause analysis

                    C.  Network traffic analysis

                    D.  Fagan analysis

               13.  What step of the Electronic Discovery Reference Model ensures
                    that information that may be subject to discovery is not altered?

                    A.  Preservation

                    B.  Production
   1378   1379   1380   1381   1382   1383   1384   1385   1386   1387   1388