Chapter 19 - Incidents And Ethics Flashcards

1
Q

Hacktivists are motivated by what factors?

A

Political motivation with thrill of hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the best way to recognize abnormal and suspicious behavior on your system?

A

Know what your normal system activity looks like.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to (ISC)2 code of ethics, how are CISSPs expected to act?

A

Key word is act. Answer is honorably, honestly, justly, responsibly, and legally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which actions are considered unacceptable and unethical according to RFC 1087, “Ethics and Internet”

A

Seeks to gain unauthorized access to the resources of the Internet
Disrupts the intended use of the Internet
Wastes resources (people, capacity, computer) through such actions
Destroy the integrity of computer-based information
Compromises the privacy of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Direct Evidence

A

Direct evidence can prove a fact all by itself and does not need backup information to refer to. When using direct evidence, presumptions are not required. One example of direct evidence is the testimony of a witness who saw a crime take place. Although this oral evidence would be secondary in nature, meaning a case could not rest on just it alone, it is also direct evidence, meaning the lawyer does not necessarily need to provide other evidence to back it up. Direct evidence often is based on information gathered from a witness’s five senses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three steps for virus escalation

A
  1. Identify the virus and notify personnel.
  2. Action/Reaction involves containing the virus and determining how to solve the problem.
  3. Follow up is repairing any damage and implementing controls to prevent future viruses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three steps for virus escalation

A
  1. Identify the virus and notify personnel.
  2. Action/Reaction involves containing the virus and determining how to solve the problem.
  3. Follow up is repairing any damage and implementing controls to prevent future viruses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly