Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Incident Handling for Managers Quiz
Incident Handling for Managers
Step 1 of 11
What operating system should your team not use when performing forensics analysis?
Which of the eleven articles of The Federal Rules of Evidence (FRE) does Rule 43 (stated below) support?
Contents of Writings, Recordings and Photographs
Relevancy and Its Limits
Opinions and Expert Testimony
What is Inculpatory evidence when performing system forensics of an incident?
Contradicts existing data
Verifies existing data
(IRP) does a team member assign ownership of an incident or potential incident to an incident handler?
When overseeing forensic evidence handling, the incident response team manager is responsible for:
Collecting hard drives, external storage devices, and other pieces of evidence for documentation
None of the above
Reviewing log files
Ensuring each person handling evidence logs onto an evidence log to document activities
What corporate security policy describes the communication to who and when dealing with responding to incidents?
Which corporate security activity and procedure is essential?
All of the above
Install, update and run antivirus software on servers
Perform security reviews of all custom coding
Update all software with security patches
Schedule and perform system backups on a monthly basis
Which is not an incident classification level?
Denial of Service
On an Incident Response team, the Forensics Examiner's role is to?
None of the above
Draw conclusions on evidence gathered, report directly to the team manager, and act as a Subject Matter Expert (SME) capable of filling the role as an expert witness in the court of law.
Examine captured evidence at the scene of the incident/crime and document all relevant details of evidence for analysis and final reports.
Capture and collect digital evidence required for analyzing, documenting, and reporting the incident.
Which policy pertains to staff following specific authorization steps to ensure system security when accessing company systems on personal computers?
Remote System Access Policy
Company Telecommuting Policy
Bring Your Own Device (BYOD) Policy
Website Content Policy
File Sharing and File Transfer Policy