试卷名称:CISSP认证考试(法律、法规、调查与合规)模拟试卷1

上一题: There are three different types of ...
下一题: During an incident response, what s...
单项选择题

A suspected crime has been reported within your organization. Which of the following steps should the incident response team take first?  

A.Establish a procedure for responding to the incident.

B.Call in forensics experts.

C.Determine that a crime has been committed.

D.Notify senior management.

您可能感兴趣的题目

Cyberlaw categorizes computer-related crime into three categories. Which of the following is an example of a crime in which the use of a computer would be categorized as incidental? Carrying out a buffer overflow to take control of a system The electronic distribution of child pornography Attacking financial systems to steal funds Capturing passwords as they are sent to the authentication server
Which organization has been developed to deal with economic, social, and governance issues, and with how sensitive data is transported over borders? European Union Council of Europe Safe Harbor Organisation for Economic Co-operation and Development
Different countries have different legal systems. Which of the following correctly describes customary law? Not many countries work under this law purely; most instead use a mixed system where this law, which deals mainly with personal conduct and patterns of behavior, is an integrated component. It covers all aspects of human life, but is commonly divided into responsibilities and obligations to others, and religious duties. It is a rule-based law focused on codified law. Based on previous interpretations of laws, this system reflects the community’s morals and expectations.
There are different types of approaches to regulations. Which of the following is an example of self-regulation? The Health Insurance Portability and Accountability Act The Sarbanes-Oxley Act The Computer Fraud and Abuse Act PCI Data Security Standard
A suspected crime has been reported within your organization. Which of the following steps should the incident response team take first? Establish a procedure for responding to the incident. Call in forensics experts. Determine that a crime has been committed. Notify senior management.
During an incident response, what stage involves mitigating the damage caused by an incident? Investigation Containment Triage Analysis
Which of the following is a correct statement regarding computer forensics? It is the study of computer technology. It is a set of hardware-specific processes that must be followed in order for evidence to be admissible in a court of law. It encompasses network and code analysis, and may be referred to as electronic data discovery. Computer forensics responsibilities should be assigned to a network administrator before an incident occurs.
What type of common law deals with violations committed by individuals against government laws, which are created to protect the public? Criminal law Civil law Tort law Regulatory law
What concept states that a criminal leaves something behind and takes something with them? Modus Operandi Profiling Locard’s Principle of Exchange Motive, Opportunity, and Means
The common law system is broken down into which of the following categories? Common, civil, criminal Legislation, bills, regulatory Civil, criminal, regulatory Legislation, bills, civil
Widgets Inc. wishes to protect its logo from unauthorized use. Which of the following will protect the logo and ensure that others cannot copy and use it? Patent Copyright Trademark Trade secret law
Which of the following means that a company did all it could have reasonably done to prevent a security breach? Downstream liability Responsibility Due diligence Due care
For evidence to be legally admissible, it must be authentic, complete, sufficient, and reliable. Which characteristic refers to the evidence having a reasonable and sensible relationship to the findings? Complete Reliable Authentic Sufficient
Which of the following statements is not true of dumpster diving? It is legal. It is unethical. It is illegal. It is a nontechnical attack.
As a CISSP candidate, you must sign a Code of Ethics. Which of the following is from the (ISC)2 Code of Ethics for the CISSP? Information should be shared freely and openly; thus, sharing confidential information should be ethical. Think about the social consequences of the program you are writing or the system you are designing. Discourage unnecessary fear or doubt. Do not participate in Internet-wide experiments in a negligent manner.
Which of the following was the first international treaty seeking to address computer crimes by coordinating national laws and improving investigative techniques and international cooperation? Council of Global Convention on Cybercrime Council of Europe Convention on Cybercrime Organisation for Economic Co-operation and Development Organisation for Cybercrime Co-operation and Development
Lee is a new security manager who is in charge of ensuring that his company complies with the European Union Principles on Privacy when his company is interacting with their European partners. The set of principles that deals with transmitting data considered private is encompassed within which of the following laws or regulations? Data Protection Directive Organisation for Economic Co-operation and Development Federal Private Bill Privacy Protection Law
There are four categories of software licensing. Which of the following refers to software sold at a reduced cost? Shareware Academic software Freeware Commercial software
There are three different types of incident response teams. Which of the following correctly describes a virtual team? It consists of experts who have other duties within the organization. It can be cost prohibitive to smaller organizations. It is a hybrid model. Core members are permanently assigned to the team.
Which of the following dictates that all evidence be labeled with information indicating who secured and validated it? Chain of custody Due care Investigation Motive, Opportunity, and Means

相关试卷

  • CISSP认证考试模拟试卷4

  • CISSP认证考试模拟试卷3

  • CISSP认证考试模拟试卷2

  • CISSP认证考试模拟试卷1

  • CISSP认证考试(软件开发安全)模拟试卷1

  • CISSP认证考试(访问控制)模拟试卷1

  • CISSP认证考试(信息安全治理与风险管理)模拟试卷1

  • CISSP认证考试(通信安全与网络安全)模拟试卷1

  • CISSP认证考试(安全体系结构和设计)模拟试卷1

  • CISSP认证考试(密码学)模拟试卷1

  • CISSP认证考试(物理安全与环境安全)模拟试卷1

  • CISSP认证考试(法律、法规、调查与合规)模拟试卷1

  • CISSP认证考试(业务连续性和灾难恢复)模拟试卷1

  • CISSP认证考试(安全运营)模拟试卷1