206. Law enforcement agencies have developed personality profiles of computer criminals. Careful planning prior to an actual crime is an example of which one of the following characteristics?
a. Organizational characteristics
b. Operational characteristics
c. Behavioral characteristics
d. Resource characteristics
Organizational characteristics describe the ways in which computer criminals group themselves with national and international connections. Behavioral characteristics deal with motivation and personality profiles. Resource characteristics address training and equipment needs and the overall support structure.
207. When ‘n’ incident reports are made by an organization, it can lead to a wrong conclusion that:
a. There are ‘
b. There are ‘
c. There are ‘
d. There are ‘
208. Which of the following should be established to minimize security incident impact?
a. Learning and training
b. Baselining and safeguarding
c. Layering and zoning
d. Testing and sampling
Learning is knowledge gained by studying either in the classroom or through individual research and investigation. Training is teaching people the knowledge and skills that can enable them to perform their jobs more effectively. Baseline security is incorrect because it is the minimum-security control required for safeguarding an IT system based on its identified needs for confidentiality, integrity, and availability protection. Sampling is used in testing where a representative sample is taken from a defined population.
209. Which of the following will
a. The person who originated the defamatory remark
b. The person who repeated the defamatory remark
c. The person who read the defamatory remark
d. The person who republished the defamatory remark
210. Log analysis is a part of which of the following?
a. Directive controls
b. Preventive controls
c. Detective controls
d. Corrective controls
Directive controls are broad-based controls to handle security incidents, and they include management’s policies, procedures, and directives. Preventive controls deter security incidents from happening in the first place. Corrective controls are procedures to react to security incidents and to take remedial actions on a timely basis. Corrective controls require proper planning and preparation as they rely more on human judgment.
211. Which of the following facilitates a computer-security incident event correlation?
a. File transfer protocol (FTP)