The other three choices are incorrect because they represent a state that is not accessible by the vulnerability testing tools. Generalized audit software or special utility programs can handle such events better.
146. What is oral testimony?
a. Cumulative evidence
b. Proffered evidence
c. Direct evidence
d. Negative evidence
The other three choices are incorrect because they do not use oral testimony. Cumulative evidence is evidence introduced to prove a fact for which other evidence has already been introduced. Proffered evidence is evidence that a party seeks to introduce as evidence to prove or defeat some crime, claim, or defense. This can be pros or cons. Negative evidence is evidence that something did not happen or does not exist.
147. Which of the following phases of a security incident investigation process determines whether a computer crime has occurred?
a. Initiating the investigation
b. Testing and validating the incident hypothesis
c. Analyzing the incident
d. Presenting the evidence
The correct order of the investigation process is gather facts (phase 1), interview witnesses (phase 1), develop incident hypothesis (phase 1), test and validate the hypothesis (phase 2), analyze (phase 3), and report the results to management and others (phase 4).
148. Which of the following investigative tools is
a. Interviews
b. Questionnaires
c. Forensic analysis
d. Computer analysis
149. Which of the following methods is acceptable to handle computer equipment seized in a computer crime investigation?
a. Exposing the magnetic media to radio waves
b. Laying the magnetic media on top of electronic equipment
c. Subjecting the magnetic media to forensic testing
d. Leaving the magnetic media in the trunk of a vehicle containing a radio unit
150. To preserve the integrity of collected evidence in a criminal prosecution dealing with computer crime, who should
a. A law enforcement staff trained in computers
b. A computer consultant with requisite technical experience
c. A civilian witness with expertise in computers
d. A teenage hacker who is a computer expert