a. Access mechanism
b. Target mechanism
c. Transmission mechanism
d. Incident mechanism
201. What is incorrectly classifying a malicious activity as a benign activity called?
a. False negative
b. False positive
c. False warnings
d. False alerts
202. Which of the following computer and network data analysis methods dealing with computer-incident purposes helps identify policy violations?
a. Operational troubleshooting
b. Log monitoring
c. Data recovery
d. Data acquisition
Operational troubleshooting is incorrect because it applies to finding the virtual and physical location of a host with an incorrect network configuration, resolving a functional problem with an application, and recording and reviewing the current operating system and application configuration settings for a host.
Data recovery is incorrect because data recovery tools can recover lost data from systems. This includes data that has been accidentally or purposely deleted, overwritten, or otherwise modified.
Data acquisition is incorrect because it deals with tools to acquire data from hosts that are being redeployed or retired. For example, when a user leaves an organization, the data from the user’s workstation can be acquired and stored in case the data is needed in the future. The workstation’s media can then be sanitized to remove all the original user’s data.
203. Which of the following is
a. Security event management software
b. Protocol analyzer
c. Log filtering tool
d. Visualization tool
Security event management software is incorrect because it is capable of importing security event information from various network traffic-related security event data sources (e.g., IDS logs and firewall logs) and correlating events among the sources.
Log filtering tool is incorrect because it helps an analyst to examine only the events that are most likely to be of interest. Visualization tool is incorrect because it presents security event data in a graphical format.
204. What is a technique for concealing or destroying data so that others
a. Antiforensic
b. Steganography
c. Digital forensic
d. Forensic science
205. A search warrant is required:
a. Before the allegation has been substantiated
b. After establishing the probable cause(s)
c. Before identifying the number of investigators needed
d. After seizing the computer and related equipment