Page 1384 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1384

C.  Processing

                    D.  Presentation


               14.  Gary is a system administrator and is testifying in court about a
                    cybercrime incident. He brings server logs to support his
                    testimony. What type of evidence are the server logs?

                    A.  Real evidence

                    B.  Documentary evidence

                    C.  Parole evidence

                    D.  Testimonial evidence

               15.  If you need to confiscate a PC from a suspected attacker who does
                    not work for your organization, what legal avenue is most

                    appropriate?

                    A.  Consent agreement signed by employees.

                    B.  Search warrant.

                    C.  No legal avenue is necessary.

                    D.  Voluntary consent.

               16.  Why should you avoid deleting log files on a daily basis?

                    A.  An incident may not be discovered for several days and valuable
                        evidence could be lost.

                    B.  Disk space is cheap, and log files are used frequently.

                    C.  Log files are protected and cannot be altered.


                    D.  Any information in a log file is useless after it is several hours
                        old.

               17.  What phase of the Electronic Discovery Reference Model examines
                    information to remove information subject to attorney-client
                    privilege?

                    A.  Identification

                    B.  Collection
   1379   1380   1381   1382   1383   1384   1385   1386   1387   1388   1389