3. In general, which of the following evidence is
a. Hearsay evidence
b. Primary evidence
c. Material evidence
d. Substantive evidence
The other three choices are admissible in a court of law. Primary evidence is original and best evidence. It is confined to documentary evidence and applies to proof of a writing’ content. Material evidence is evidence that was relevant to prove a disputed consequential fact and is also used to say evidence having some weight. Substantive evidence is evidence that is admitted to prove the significance of the party’s case rather than to attack the credibility of an opposing witness.
Similarly, business documents (for example, sales orders and purchase orders) created during regular business transactions are considered admissible in a court of law. Another example is photographs represent hearsay evidence but are considered admissible if they are properly authenticated by witnesses who are familiar with the subject.
4. All of the following are the primary elements of a security incident triad except:
a. Detect
b. Respond
c. Report
d. Recover
The “report” is a secondary element and is a byproduct of the primary elements. Reporting can be done internally to management, which is required, and externally to public (for example, media/press, law enforcement authorities, and incident reporting organizations), which is optional. How much external reporting is done depends on the organization’s management openness to report due to adverse publicity and reputation risk involved from bad security breaches.
5. Which of the following makes the security incident event correlation work much easier and faster?
a. Distributed logging
b. Local logging
c. Centralized logging
d. Centralized monitoring
6. Networks and systems profiling is a technical measure for aiding in incident analysis and is achieved through which of the following means?
1. Running file integrity checking software on hosts
2. Monitoring network bandwidth usage
3. Monitoring host resource usage
4. Determining the average and peak usage levels
a. 2 only
b. 3 only
c. 4 only
d. 1, 2, 3, and 4
7. The incident response team should discuss which of the following containment strategies with its legal department to determine if it is feasible?
a. Full containment
b. Phase containment
c. Partial containment
d. Delayed containment