CERTIVIEW

Wednesday, 13 January 2016

CISSP Question of the Week: Forensic Investigation

CISSPQOWRedCISSP Question of the Week courtesy of Transcender Labs.

As a part of the incident response team, you have been given a procedures document that identifies the steps you must complete during a forensic investigation.

After which event should the evidence collection step be completed?

A. The incident has been identified only
B. The evidence has been preserved only
C. The incident has been identified and the evidence has been preserved
D. The incident has been identified, the evidence has been preserved, and the evidence has been analyzed

Reveal Answer

The correct answer is C.

You should complete the evidence collection step after the incident has been identified and the evidence has been preserved.

The proper steps in a forensic investigation are as follows:

  • Identification – This step can include event/crime detection, signature resolution, profile detection, anomaly detection, complaint reception, system monitoring, and audit analysis.
  • Preservation – This step can include imaging technologies, chain of custody standards, and time synchronization.
  • Collection – This step can include approved collection methods, approved software, approved hardware, legal authority, sampling, data reduction, and recovery techniques.
  • Examination – This step can include traceability, validation techniques, filtering techniques, pattern matching, hidden data discovery, and hidden data extraction.
  • Analysis – This step can include traceability, statistical analysis, protocol analysis, data mining, and timeline determination.
  • Presentation – This step can include documentation, expert testimony, clarification, mission impact statement, recommended countermeasures, and statistical interpretation.
  • Decision – This step can include management reports, court decisions, and internal decisions.

 

Related Course
CISSP Certification Prep Course

CISSP Question of the Week Series

  • CISSP Question of the Week: Pillar of Basel II
  • CISSP Question of the Week: Implement Redundant Servers
  • CISSP Question of the Week: Terrorist Attacks
  • CISSP Question of the Week: Customer Credit Card Information
  • CISSP Question of the Week: Complex Instruction Set Computers
  • CISSP Question of the Week: Asymmetric Encryption
  • CISSP Question of the Week: OSI Layer for Formatting Data
  • CISSP Question of the Week: Secure Communications
  • CISSP Question of the Week: Biometric System and Fingerprinting Technology
  • CISSP Question of the Week: Security Management Life Cycle
  • CISSP Question of the Week: Anomaly-based Monitoring
  • CISSP Question of the Week: Forensic Investigation


from
CERTIVIEW
Posted by Unknown at 05:05
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: certification, CERTIVIEW, course, elearning, Global Knowledge Training Blog, IT, online test, Security

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2017 (143)
    • ►  March (19)
    • ►  February (55)
    • ►  January (69)
  • ▼  2016 (1230)
    • ►  December (46)
    • ►  November (61)
    • ►  October (65)
    • ►  September (66)
    • ►  August (75)
    • ►  July (39)
    • ►  June (71)
    • ►  May (68)
    • ►  April (175)
    • ►  March (201)
    • ►  February (199)
    • ▼  January (164)
      • Openbravo achieves three-digit bookings growth in ...
      • Hansa Cequity bolsters its senior management with ...
      • Riverbed appoints Nagendra Venkaswamy as vice pres...
      • Suburban Diagnostics selects IBM to scale up busin...
      • GPX: AWS comes to India
      • Microsoft Releases Azure Stack Technical Preview 1
      • The Week In Storage: If We Are Running Out Of Stor...
      • How To Send Files Over WinRM With PowerShell
      • CCNA Security Question of the Week: Global Configu...
      • Memblaze PBlaze4 Enterprise NVMe SSD Review
      • Flash And HCI Collide, Pivot3 Purchasing NexGen St...
      • Information Rights Management: The Missing Piece I...
      • IBM offers new hybrid cloud capabilities for LinuxONE
      • Winners in the Digital Economy Will Place People F...
      • NEC ups its ante in cyber security; launches cyber...
      • EnterpriseDB Releases Postgres Advanced Server 9.5
      • ForgeRock Identity Platform Offers Advances In Dat...
      • CISSP Question of the Week: Relational Database
      • API Testing – A rising trend in 2016
      • Aimed at ‘Make in India’ initiative, Ricoh eyes ma...
      • Chumbak Selects IBM Cloud to Accelerate Business
      • Vodafone Boosts Customer Experience with Cisco’s S...
      • HCL Bags Global IT Transformational Deal from Alstom
      • How Will Startup India Help You?
      • Flash And 3D XPoint Are Better Together, Plexistor...
      • How To Maximize Your IT Training Budget
      • HotLink Corporation Announces New Disaster Recover...
      • nGenx nWorkspace Application Catalog Grows To 1,800
      • IBM Announces Advances In IBM LinuxONE
      • 3 Tips To Attract And Keep Qualified IT Staff
      • Sudish Kumar joins Perpetuuiti as VP, Sales, APAC ...
      • Can Analytics Save $300,000?
      • ISACA’s cybersecurity Nexus launches tools to help...
      • Citrix appoints Kirill Tatarinov as President and CEO
      • The Week In Storage: Reliability Still A Thing, Cl...
      • Feeling Secure With Kingston's DataTraveler 2000 U...
      • Intro To String Formatting In PowerShell
      • CCNP Security Question of the Week: SSH Login
      • Cisco annual security report reveals a decline in ...
      • Ericsson partners with Sterlite Technologies to dr...
      • Obi Worldphone SF1 to expand to Amazon.in
      • This is how Bausch & Lomb fixed up its business co...
      • Swipe Technologies launches luxurious metal frame ...
      • Beawel launches an App that promotes Beauty and We...
      • Oracle Certification Guide: Overview And Career Paths
      • HGST Ultrastar NVMe SN150 Enterprise SSD Review
      • ZyXEL Expands Its 11AC Series With Two New Access ...
      • HDS Unveils New HFS A-Series All-Flash Arrays
      • JFrog Leaps Ahead With Massive Round Of Funding
      • Vennli Launches Heat Map Analytics View
      • Cisco Certification Guide: Overview And Career Paths
      • Build your brand online with personal domains from...
      • Genpact announces appointment of Meena Wilson as e...
      • CISSP Question of the Week: File Backup
      • SHEROES join hands with ‘Girls in Tech’ India to p...
      • APUS launcher adds a unique feature – APUS Discovery
      • Retailers must provide ‘ME’aningful customer exper...
      • Mindtree unveils Flooresense platform for the reta...
      • Flipkart continues to dominate mobile commerce in ...
      • TO THE NEW Digital organized GR8Conf IN
      • How technology is boosting healthcare in India
      • SAS Is Alive And Kicking With Toshiba's PX04SL SSD
      • Samsung Begins Mass Production Of HBM2 DRAM
      • MAIT outlines reforms to improve ‘Ease of Doing Bu...
      • Informatica Names Chairman, Chief Executive Office...
      • Lenovo launches ThinkServers aimed at Indian SMEs
      • CA Technologies study finds serious lag in organiz...
      • Young workers optimistic about careers, positive a...
      • Keeping data secure in the ‘24/7’ world
      • 3 Tips For Balancing Work With IT Certification Pr...
      • CCNA Security Question of the Week: CLI Command
      • Microsoft acquires management, reporting and analy...
      • India wakes up to digital security
      • The Week In Storage: Violin Continues Slide, Diabl...
      • How To Use PowerShell DSC To Build A Hyper-V Virtu...
      • HP Enterprise Claims a Fast and Safe Path to the A...
      • MapR partners launch free test drives in collabora...
      • Analysts reveal five unexpected implications arisi...
      • SLC SSDs Undergo MLC Makeover As Virtium, Transcen...
      • Raytheon|Websense becomes Forcepoint
      • Raytheon|Websense becomes Forcepoint
      • CompTIA Certification Guide: Overview And Career P...
      • Quarch XLC Programmable Power Module Review
      • AMD Puts The Opteron A1100 ARM SoC Into Full Produ...
      • What Developers Can Expect in 2016
      • ShopInSync partners with Lava to offer one stop sh...
      • Sanovi launches cloud migration manager
      • How real is IoT?
      • Best Antivirus Solutions For Windows 10
      • Seagate Introduces Helium-Infused 10TB Enterprise ...
      • Cisco Takes On Shadow IT With New SaaS Product
      • Gigabyte Debuts Four New Mini-ITX Xeon D-1500 Moth...
      • CISSP Question of the Week: Forensic Investigation
      • Ericsson announces the launch of Ericsson Innovati...
      • Worldwide PC Shipments Declined 8.3 Percent in Fou...
      • Akamai Identifies SEO Web Application Attack Campaign
      • Higher education institutions must grow the strate...
      • Track air quality in your locality with Helpchat app
      • UCWeb partners with Hungama Music
      • HackerRank identifies top challenges faced by Code...
  • ►  2015 (947)
    • ►  December (190)
    • ►  November (248)
    • ►  October (291)
    • ►  September (218)

About Me

Unknown
View my complete profile
Simple theme. Powered by Blogger.