Search Header Logo

Midterm Review 2

Authored by Angelina CTA]

Computers

11th Grade

Used 7+ times

Midterm Review 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true regarding precautions you should take when looking for forensic tools on the Internet?

If the tool is accurate, there should be no problems using it.

You must be certified in this tool in case you have to go to court.

The tool must be endorsed by the FBI.

You need to be verify that the tool is not considered junk science.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been called to analyze a company computer that has potentially stolen information. What is your first step?

Obtain a search warrant

Install a write-blocker to the system

Shut the system off to prevent remote access

Install Encase on the machine to begin the forensic search

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The FBI has a permanent team of computer forensics. They call their team the ____ team.

CIRT

CART

RCFL

First-response

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In addition to having a solid foundation in computer forensics, a technician should have some expertise and understanding of ____.

business management

engineering

criminal justice

analytics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After an incident is isolated or contained, what does the SANS institute suggest as the next phase?

Eradication

Recovery

Identification

Lessons learned

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does incident response differ from risk management?

Risk management provides the steps for an incident response.

Risk management is performed by first responders, and incident response is performed by the CSIRT.

Risk management is optional; incident response is mandatory.

Risk management helps analyze and set prevention strategies, and incident response consists of the steps to follow if an incident still occurs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user responded to a phishing e-mail and provided some company data as a result. After the incident is contained, which of the following would be done in the lessons learned stage of the IRP?

Install encrypted an e-mail system

Review the annual training procedures on phishing

Have the employee who opened the e-mail explain why they answered the e-mail

Update the risk assessment procedures for e-mail usage

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?