CISSP Prep- Legal And Investigations

15 Questions | Total Attempts: 130

SettingsSettingsSettings
CISSP Quizzes & Trivia

Questions and Answers
  • 1. 
    Where does the greatest risk of cybercrime come from?
    • A. 

      Outsiders

    • B. 

      Nation-states

    • C. 

      Insiders

    • D. 

      Script kiddies

  • 2. 
    What is the biggest hindrance to dealing with computer crime?
    • A. 

      Computer criminals are generally smarter than computer investigators.

    • B. 

      Adequate funding to stay ahead of the computer criminals.

    • C. 

      Activity associated with computer crime is truly international.

    • D. 

      Th ere are so many more computer criminals than investigators that it is impossible to keep up.

  • 3. 
    Computer forensics is really the marriage of computer science, information technology, and engineering with
    • A. 

      Law

    • B. 

      Information systems

    • C. 

      Analytical thought

    • D. 

      Th e scientifi c method

  • 4. 
    What principal allows us to identify aspects of the person responsible for a crime when, whenever committing a crime, the perpetrator takes something with him and leaves something behind?
    • A. 

      Meyer’s principal of legal impunity

    • B. 

      Criminalistic principals

    • C. 

      IOCE/Group of 8 Nations principals for computer forensics

    • D. 

      Locard’s principal of exchange

  • 5. 
    Which of the following is not one of the fi ve rules of evidence?
    • A. 

      Be authentic

    • B. 

      Be redundant

    • C. 

      Be complete

    • D. 

      Be admissible

  • 6. 
    What is not mentioned as a phase of an incident response?
    • A. 

      Documentation

    • B. 

      Prosecution

    • C. 

      Containment

    • D. 

      Investigation

  • 7. 
    __________ emphasizes the abstract concepts of law and is infl uenced by the writings of legal scholars and academics.
    • A. 

      Criminal law

    • B. 

      Civil law

    • C. 

      Religious law

    • D. 

      Administrative law

  • 8. 
    Which type of intellectual property covers the expression of ideas rather than the ideas themselves?
    • A. 

      Trademark

    • B. 

      Patent

    • C. 

      Copyright

    • D. 

      Trade secret

  • 9. 
    Which type of intellectual property protects the goodwill a merchant or vendor invests in its products?
    • A. 

      Trademark

    • B. 

      Patent

    • C. 

      Copyright

    • D. 

      Trade secret

  • 10. 
    Which of the following is not a computer forensics model?
    • A. 

      IOCE

    • B. 

      SWGDE

    • C. 

      MOM

    • D. 

      ACPO

  • 11. 
    Which of the following is not a category of software licensing?
    • A. 

      Freeware

    • B. 

      Commercial

    • C. 

      Academic

    • D. 

      End-user licensing agreement

  • 12. 
    What are the rights and obligations of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information related to?
    • A. 

      Privacy

    • B. 

      Secrecy

    • C. 

      Availability

    • D. 

      Reliability

  • 13. 
    Triage encompasses which of the following incident response subphases?
    • A. 

      Collection, transport, testimony

    • B. 

      Traceback, feedback, loopback

    • C. 

      Detection, identification, notifi cation

    • D. 

      Confi dentiality, integrity, availability

  • 14. 
    • A. 

      Comparing hash totals to the original source

    • B. 

      Keeping good notes

    • C. 

      Taking pictures

    • D. 

      Can never be proven

  • 15. 
    When dealing with digital evidence, the crime scene
    • A. 

      Must never be altered

    • B. 

      Must be completely reproducible in a court of law

    • C. 

      Must exist in only one country

    • D. 

      Must have the least amount of contamination that is possible