Which of the following are the ways of sending secure e - mail messages over the Internet?
Each correct answer represents a complete solution. Choose two.
Question No 2
You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software
applications on the systems were malfunctioning and also you were not able to access your remote
desktop session. You suspected that some malicious attack was performed on the network of the
company. You immediately called the incident response team to handle the situation who enquired
the Network Administrator to acquire all relevant information regarding the malfunctioning. The
Network Administrator informed the incident response team that he was reviewing the security of
the network which caused all these problems. Incident response team announced that this was a
controlled event not an incident. Which of the following steps of an incident handling process was
performed by the incident response team?
Question No 3
Which of the following is the process performed between organizations that have unique hardware
or software that cannot be maintained at a hot or warm site?
Question No 4
Which of the following involves changing data prior to or during input to a computer in an effort to
commit fraud?
Question No 5
Drag and drop the various evidences in the appropriate places.
Answer:
Explanation:
The various categories of evidences required in forensics can be divided into a number of categories,
depending on its reliability, quality, and completeness. These categories are as follows:
Best evidence: It is the original or primary evidence rather than a copy or duplicate of the evidence.
Secondary evidence: It is a copy of the evidence or an oral description of its contents. It is not as
reliable as the best evidence.Direct evidence: It proves or disproves a specific act through oral
testimony based on information gathered through the witness's five senses.
Conclusive evidence: It is incontrovertible evidence, which overrides all other evidence.
Opinions: The following are the two types of opinions:
1. Expert: It offers an opinion based on personal expertise and facts.
2. Non expert: It can testify only to facts.Circumstantial evidence:It is the inference of information
from other, intermediate, relevant facts.
Hearsay evidence: This evidence is commonly not admissible in court. It is a third - party evidence.
Computer - generated records and other business records fall under the category of hearsay evidence
because these records cannot be proven accurate and reliable.
Reference: CISM Review Manual 2010, Contents: "Incident Management and Response"