CISSP Prep- Legal And Investigations

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cindymurray
C
Cindymurray
Community Contributor
Quizzes Created: 8 | Total Attempts: 15,187
| Attempts: 178 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. What are the rights and obligations of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information related to?

Explanation

Privacy can be defi ned as “the rights and obligations of individuals
and organizations with respect to the collection, use, retention, and disclosure
of personal information.” Page 514.

Submit
Please wait...
About This Quiz
CISSP Quizzes & Trivia

This CISSP Prep quiz focuses on Legal and Investigations, exploring insider cybercrime risks, international computer crime challenges, computer forensics, evidence rules, and incident response phases. It's designed to... see moreenhance understanding of legal aspects in cybersecurity. see less

2. Integrity of a forensic bit stream image is often determined by

Explanation

Ensuring the authenticity and integrity of evidence is critical.
If the courts feel the evidence or its copies are not accurate or lack integrity, it is
doubtful that the evidence or any information derived from the evidence will be
admissible. Th e current protocol for demonstrating authenticity and integrity relies
on hash functions that create unique numerical signatures that are sensitive to any

Submit
3. Where does the greatest risk of cybercrime come from?

Explanation

A word of caution is necessary: although the media has tended
to portray the threat of cybercrime as existing almost exclusively from the outside,
external to a company, reality paints a much diff erent picture. Th e greatest risk of
cybercrime comes from the inside, namely, criminal insiders. Page 520.

Submit
4. What is not mentioned as a phase of an incident response?

Explanation

Th e incident response and handling phase can be broken down
further into triage, investigation, containment, and analysis and tracking. Page 523.

Submit
5. Which of the following is not one of the fi ve rules of evidence?

Explanation

At a more generic level, evidence should have some probative
value, be relevant to the case at hand, and meet the following criteria (often called
the fi ve rules of evidence): be authentic, be accurate, be complete, be convincing,
and be admissible. Page 531.

Submit
6. Computer forensics is really the marriage of computer science, information technology, and engineering with

Explanation

As a forensic discipline, this area deals with evidence and the
legal system and is really the marriage of computer science, information technology,
and engineering with law. Page 529.

Submit
7. Triage encompasses which of the following incident response subphases?

Explanation

Triage is a process in incident response that involves quickly assessing and prioritizing the incidents. The correct answer, "Detection, identification, notification," accurately represents the subphases of triage. Detection refers to identifying the presence of an incident, identification involves determining the nature and scope of the incident, and notification involves informing the appropriate individuals or teams about the incident. These subphases are crucial in effectively responding to and managing incidents.

Submit
8. What is the biggest hindrance to dealing with computer crime?

Explanation

Th e biggest hindrance to eff ectively dealing with computer
crime is the fact that this activity is truly international in scope, and thus requires
an international solution, as opposed to a domestic one based on archaic concepts
of borders and jurisdictions. Page 520.

Submit
9. What principal allows us to identify aspects of the person responsible for a crime when, whenever committing a crime, the perpetrator takes something with him and leaves something behind?

Explanation

Locard’s principle of exchange states that when a crime is committed,
the perpetrators leave something behind and take something with them,
hence the exchange. Th is principle allows us to identify aspects of the persons
responsible, even with a purely digital crime scene. Page 530.

Submit
10. Which type of intellectual property covers the expression of ideas rather than the ideas themselves?

Explanation

A copyright covers the expression of ideas rather than the ideas
themselves; it usually protects artistic property such as writing, recordings, databases,
and computer programs. Page 512.

Submit
11. __________ emphasizes the abstract concepts of law and is infl uenced by the writings of legal scholars and academics.

Explanation

Civil law emphasizes the abstract concepts of law and is infl uenced
by the writings of legal scholars and academics, more so than common law
systems. Page 509

Submit
12. Which type of intellectual property protects the goodwill a merchant or vendor invests in its products?

Explanation

Trademark laws are designed to protect the goodwill a merchant
or vendor invests in its products. Page 511.

Submit
13. Which of the following is not a computer forensics model?

Explanation

Like incident response, there are various computer forensics
guidelines (e.g., International Organization of Computer Evidence (IOCE),
Scientifi c Working Group on Digital Evidence (SWGDE), Association of Chief
Police Offi cers (ACPO)). Th ese guidelines formalize the computer forensic processes
by breaking them into numerous phases or steps. MOM stands for means,
opportunity, and motives. Page 529.

Submit
14. Which of the following is not a category of software licensing?

Explanation

Th ere are four categories of software licensing: freeware, shareware,
commercial, and academic. Within these categories, there are specifi c types
of agreements. Master agreements and end-user licensing agreements (EULAs) are
the most prevalent. Page 513.

Submit
15. When dealing with digital evidence, the crime scene

Explanation

Given the importance of the evidence that is available at a
crime scene, the ability to deal with a scene in a manner that minimizes the amount
of disruption, contamination, or destruction of evidence. Once a scene has been contaminated,
there is no undo or redo button to push; the damage is done. Page 531.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 21, 2012
    Quiz Created by
    Cindymurray
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What are the rights and obligations of individuals and organizations...
Integrity of a forensic bit stream image is often determined by
Where does the greatest risk of cybercrime come from?
What is not mentioned as a phase of an incident response?
Which of the following is not one of the fi ve rules of evidence?
Computer forensics is really the marriage of computer science,...
Triage encompasses which of the following incident response subphases?
What is the biggest hindrance to dealing with computer crime?
What principal allows us to identify aspects of the person responsible...
Which type of intellectual property covers the expression of ideas...
__________ emphasizes the abstract concepts of law and is infl uenced...
Which type of intellectual property protects the goodwill a merchant...
Which of the following is not a computer forensics model?
Which of the following is not a category of software licensing?
When dealing with digital evidence, the crime scene
Alert!

Advertisement