Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF CISSP-ISSMP Study Guide

Page: 6 / 8
Total 218 questions

ISSMPĀ®: Information Systems Security Management Professional Questions and Answers

Question 21

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Names of the victims

B.

Location of each incident

C.

Nature of harassment

D.

Date and time of incident

Question 22

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Preparea chain of custody and handle the evidence carefully.

B.

Examine original evidence and never rely on the duplicate evidence.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Follow the rules of evidence and never temper with the evidence.

Question 23

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Options:

A.

Organizational chart reviews

B.

Executive management interviews

C.

Overlaying system technology

D.

Organizational process models

Question 24

Which of the following statements is true about auditing?

Options:

A.

It is used to protect the network against virus attacks.

B.

It is used to track user accounts for file and object access, logon attempts, etc.

C.

It is used to secure the network or the computers on the network.

D.

It is used to prevent unauthorized access to network resources.

Page: 6 / 8
Total 218 questions