Unformatted text preview: n or comments about the exam to other CISSP
B. Submitting comments on the questions of the exam to (ISC)2
C. Submitting comments to the board of directors regarding the test and
content of the class
D. Conducting a presentation about the CISSP certification and what the
6. If your company gives you a new PC and you find residual information about
confidential company issues, what should you do based on the (ISC)2 Code
A. Contact the owner of the file and inform him about it. Copy it to a disk,
give it to him, and delete your copy.
B. Delete the document because it was not meant for you.
C. Inform management of your findings so it can make sure this type of thing
does not happen again.
D. E-mail it to both the author and management so everyone is aware of what
is going on.
7. Why is it difficult to investigate computer crime and track down the criminal?
A. Privacy laws are written to protect people from being investigated for these
types of crimes.
B. Special equipment and tools are necessary to detect these types of criminals.
C. Criminals can hide their identity and hop from one network to the next.
D. The police have no jurisdiction over the Internet. ch10.indd 914 12/4/2009 11:39:15 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 Chapter 10: Legal, Regulations, Compliance, and Investigations 915
8. Protecting evidence and providing accountability for who handled it at
different steps during the investigation is referred to as what?
A. The rule of best evidence
C. Evidence safety
D. Chain of custody
9. If an investigator needs to communicate with another investigator but does
not want the criminal to be able to eavesdrop on this conversation, what type
of communication should be used?
A. Digitally signed messages
B. Out-of-band messages
C. Forensics frequency
D. Authentication and access control
10. Why is it challenging to collect and identify computer evidence to be used in a
court of law?
A. The evidence is mostly int...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12