Susan needs to track evidence that has been obtained throughout its life cycle. What documentation does she need to create and maintain if she expects the evidence to be used in a legal case?
Chapter 10: Incident Detection and Analysis

Quiz
•
Information Technology (IT)
•
Professional Development
•
Medium
Adrian Velazquez
Used 1+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Forensic hashes
Legal hold
Chain of custody
IoC ratings
Answer explanation
Susan needs to track the chain of custody for the evidence and should ensure that a proper chain of custody is maintained. This is especially important when dealing with data that may become part of legal proceedings. Forensic hashes are typically generated as part of forensic processes to ensure that the original and copies of forensic data match, but a hash alone does not provide chain-of-custody tracking. Legal holds require organizations to preserve data but don't track chain of custody, and IoC ratings are unrelated to this question.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Hui wants to comply with a legal hold but knows that her organization has a regular process that purges logs after 45 days due to space limitations. What should she do if the logs are covered by the legal hold?
Notify counsel that the logs will be deleted automatically in 45 days.
Delete the logs now to allow longer before space is filled up.
Identify a preservation method to comply with the hold.
Make no changes; holds allow ongoing processes to continue as normal.
Answer explanation
Hui knows that she needs to preserve the logs per the legal hold notice and will need to identify a method to preserve the logs while maintaining operations for her organization. Failing to do so can have significant legal repercussions.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Juan wants to validate the integrity of a drive that he has forensically imaged as part of an incident response process. Which of the options should he select?
Compare a hash of the original drive to the drive image.
Compare the file size on disk of the original drive to the space taken up by the drive image.
Compare the vendor's drive size listing to the space taken up by the drive image.
Use PGP to encrypt the drive and image and make sure that both encrypted versions match.
Answer explanation
Hashes are used to validate drive images and other forensic artifacts. Comparing a hash of the original and the image is commonly used to ensure that they match. None of the other options will validate a drive image, and encrypting a drive will modify it, spoiling the evidence.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Kathleen wants to determine if the traffic she is seeing is unusual for her network. Which of the following options would be most useful to determine if traffic levels are not typical for this time of day in a normal week?
Heuristics
Baselines
Protocol analysis
Network flow logs
Answer explanation
A baseline for traffic patterns and levels would allow Kathleen to determine if the traffic was typical or if something unusual was going on. Heuristics focus on behaviors, and Kathleen wants to see if traffic levels are different, not behaviors. Protocol analysis looks at whether there is an unusual protocol or data, and network flow logs are useful for determining which systems are sending traffic to where and via what protocol.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Renee wants to adopt an open IoC feed. What issue is Renee most likely to need to address when adopting it?
The cost of the IoC feed
The quality of the feed
The update frequency of the feed
The level of detail in the feed
Answer explanation
Open feed data can vary in quality and reliability. That means Renee will have to put processes in place to assess the quality and reliability of the IoC information she is receiving. An open feed implies that it is free. Open feeds are generally active, and IoC detail levels vary as IoCs are created and updated, regardless of the type of feed.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Chris wants to use an active monitoring approach to test his network. Which of the following techniques is appropriate?
Collecting NetFlow data
Using a protocol analyzer
Pinging remote systems
Enabling SNMP
Answer explanation
Active monitoring is focused on reaching out to gather data using tools like ping and iPerf. Passive monitoring using protocol analyzers collects network traffic and router-based monitoring using SNMP, and flows gather data by receiving or collecting logged information.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is not information commonly found in an IoC?
IP addresses
Domain names
System images
Behavior-based information
Answer explanation
System images are not typically part of an IOC. Hashes of malicious software may be, as well as IP addresses, hostnames, domains, and behavior- based information, among other common details.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
IP Addressing

Quiz
•
Professional Development
15 questions
IT Test

Quiz
•
Professional Development
20 questions
CCSE-2

Quiz
•
Professional Development
22 questions
Information Security Controls Quiz

Quiz
•
Professional Development
21 questions
Network Switch and VLAN Quiz

Quiz
•
Professional Development
15 questions
Exploring Computer Networks & The Internet

Quiz
•
Professional Development
20 questions
CB-Quiz On AWS_IAM USER

Quiz
•
Professional Development
20 questions
Exploring Digital Forensics

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade