Self-Test CASP Questions Flashcards
An infrastructure team is at the end of a procurement process and has selected a vendor. As part of the final negotiations, there are a number of outstanding issues, including:
- Indemnity clauses have identified the maximum liability
- The data will be hosted and managed outside of the company’s geographical location
The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project’s security consultant recommend as the NEXT step?
- Develop a security exemption, as it does not meet the security policies
- Mitigate the risk by asking the vendor to accept the in-country privacy principles
- Require the solution owner to accept the identified risks and consequences
- Review the entire procurement process to determine the lessons learned
- Require the solution owner to accept the identified risks and consequences
An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability. To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database
back online? (Choose two.)
- Secure storage policies
- Browser security updates
- Input validation
- Web application firewall
- Secure coding standards
- Database activity monitoring
- Input validation
- Database activity monitoring
Given the following output from a local PC:
— image of ipconfig —
Which of the following ACLs on a stateful host-based firewall would allow the PC to serve an intranet website?
- Allow 172.30.0.28:80 -> ANY
- Allow 172.30.0.28:80 -> 172.30.0.0/16
- Allow 172.30.0.28:80 -> 172.30.0.28:443
- Allow 172.30.0.28:80 -> 172.30.0.28:53
- Allow 172.30.0.28:80 -> 172.30.0.0/16
A penetration tester has been contracted to conduct a physical assessment of a site. Which of the following is the MOST plausible method of social engineering to be conducted during this engagement?
- Randomly calling customer employees and posing as a help desk technician requiring user password to resolve issues
- Posing as a copier service technician and indicating the equipment had “phoned home” to alert the technician for a service call
- Simulating an illness while at a client location for a sales call and then recovering once listening devices are installed
- Obtaining fake government credentials and impersonating law enforcement to gain access to a company facility
- Posing as a copier service technician and indicating the equipment had “phoned home” to alert the technician for a service call
A penetration tester is conducting an assessment on Comptia.org and runs the following command from a coffee shop while connected to the public Internet:
– image of nslookup of comptia.org’s mail exchange –
Which of the following should the penetration tester conclude about the command output?
- The public/private views on the Comptia.org DNS servers are misconfigured
- Comptia.org is running an older mail server, which may be vulnerable to exploits
- The DNS SPF records have not been updated for Comptia.org
- 192.168.102.67 is a backup mail server that may be more vulnerable to attack
- Comptia.org is running an older mail server, which may be vulnerable to exploits
Two new technical SMB security settings have been enforced and have also become policies that increase secure communications.
Network Client: Digitally sign communication
Network Server: Digitally sign communication
A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect to their department shares. Which of the following mitigation strategies should an information security manager recommend to the data owner?
- Accept the risk, reverse the settings for the remote location, and have the remote location file a risk exception until the legacy storage device can be upgraded
- Accept the risk for the remote location, and reverse the settings indefinitely since the legacy storage device will not be upgraded
- Mitigate the risk for the remote location by suggesting a move to a cloud service provider. Have the remote location request an indefinite risk exception for the use of cloud storage
- Avoid the risk, leave the settings alone, and decommission the legacy storage device
- Accept the risk, reverse the settings for the remote location, and have the remote location file a risk exception until the legacy storage device can be upgraded
A systems security engineer is assisting an organization’s market survey team in reviewing requirements for an upcoming acquisition of mobile devices. The engineer expresses concerns to the survey team about a particular class of devices that uses a separate SoC for baseband radio I/O. For which of the following reasons is the engineer concerned?
- These devices can communicate over networks older than HSPA+ and LTE standards, exposing device communications to poor encryptions routines
- The organization will be unable to restrict the use of NFC, electromagnetic induction, and Bluetooth technologies
- The associated firmware is more likely to remain out of date and potentially vulnerable
- The manufacturers of the baseband radios are unable to enforce mandatory access controls within their
driver set
- The organization will be unable to restrict the use of NFC, electromagnetic induction, and Bluetooth technologies
During a security assessment, an organization is advised of inadequate control over network segmentation. The assessor explains that the organization’s reliance on VLANs to segment traffic is insufficient to provide segmentation based on regulatory standards. Which of the following should the organization consider implementing along with VLANs to provide a greater level of segmentation?
- Air gaps
- Access control lists
- Spanning tree protocol
- Network virtualization
- Elastic load balancing
- Air gaps
A security administrator was informed that a server unexpectedly rebooted. The administrator received an export of syslog entries for analysis:
— image of syslog —
Which of the following does the log sample indicate? (Choose two.)
- A root user performed an injection attack via kernel module
- Encrypted payroll data was successfully decrypted by the attacker
- Jsmith successfully used a privilege escalation attack
- Payroll data was exfiltrated to an attacker-controlled host
- Buffer overflow in memory paging caused a kernel panic
- Syslog entries were lost due to the host being rebooted
- Jsmith successfully used a privilege escalation attack
- Buffer overflow in memory paging caused a kernel panic
An organization has employed the services of an auditing firm to perform a gap assessment in preparation for an upcoming audit. As part of the gap assessment, the auditor supporting the assessment recommends the organization engage with other industry partners to share information about emerging attacks to organizations in the industry in which the organization functions. Which of the following types of information could be drawn
from such participation?
- Threat modeling
- Risk assessment
- Vulnerability data
- Threat intelligence
- Risk metrics
- Exploit frameworks
- Threat intelligence
A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After some conversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst is now recommending that developers and testers have a separate device profile allowing this, and that the rest of the organization’s users do not have the ability to manually download and install untrusted applications. Which of the following settings should be toggled to achieve the goal? (Choose two.)
- OTA updates
- Remote wiping
- Side loading
- Sandboxing
- Containerization
- Signed applications
- Containerization
- Signed applications
A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?
- Vulnerability scanner
- TPM
- Host-based firewall
- File integrity monitor
- NIPS
- File integrity monitor
An organization is in the process of integrating its operational technology and information technology areas. As part of the integration, some of the cultural aspects it would like to see include more efficient use of resources during change windows, better protection of critical infrastructure, and the ability to respond to incidents. The following observations have been identified:
- The ICS supplier has specified that any software installed will result in lack of support.
- There is no documented trust boundary defined between the SCADA and corporate networks.
- Operational technology staff have to manage the SCADA equipment via the engineering workstation.
- There is a lack of understanding of what is within the SCADA network.
Which of the following capabilities would BEST improve the security position?
- VNC, router, and HIPS
- SIEM, VPN, and firewall
- Proxy, VPN, and WAF
- IDS, NAC, and log monitoring
- VNC, router, and HIPS
After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops. The company’s IT department has seen a large number of the following incidents:
- Duplicate IP addresses
- Rogue network devices
- Infected systems probing the company’s network
Which of the following should be implemented to remediate the above issues? (Choose two.)
- Port security
- Route protection
- NAC
- HIPS
- NIDS
- NAC
- HIPS
Following a security assessment, the Chief Information Security Officer (CISO) is reviewing the results of the assessment and evaluating potential risk treatment strategies. As part of the CISO’s evaluation, a judgment of potential impact based on the identified risk is performed. To prioritize response actions, the CISO uses past experience to take into account the exposure factor as well as the external accessibility of the weakness identified. Which of the following is the CISO performing?
- Documentation of lessons learned
- Quantitative risk assessment
- Qualitative assessment of risk
- Business impact scoring
- Threat modeling
- Qualitative assessment of risk
A Chief Information Officer (CIO) publicly announces the implementation of a new financial system. As part of a security assessment that includes a social engineering task, which of the following tasks should be conducted to demonstrate the BEST means to gain information to use for a report on social vulnerability details about the financial system?
- Call the CIO and ask for an interview, posing as a job seeker interested in an open position
- Compromise the email server to obtain a list of attendees who responded to the invitation who is on the IT staff
- Notify the CIO that, through observation at events, malicious actors can identify individuals to befriend
- Understand the CIO is a social drinker, and find the means to befriend the CIO at establishments the CIO frequents
- Understand the CIO is a social drinker, and find the means to befriend the CIO at establishments the CIO frequents
A recent assessment identified that several users’ mobile devices are running outdated versions of endpoint security software that do not meet the company’s security policy. Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?
- Vulnerability assessment
- Risk assessment
- Patch management
- Device quarantine
- Incident management
- Patch management
The Chief Information Security Officer (CISO) has asked the security team to determine whether the organization is susceptible to a zero-day exploit utilized in the banking industry and whether attribution is possible. The CISO has asked what process would be utilized to gather the information, and then wants to apply signatureless controls to stop these kinds of attacks in the future. Which of the following are the MOST appropriate ordered steps to take to meet the CISO’s request?
A. 1. Perform the ongoing research of the best practices
- Determine current vulnerabilities and threats
- Apply Big Data techniques
- Use antivirus control
B. 1. Apply artificial intelligence algorithms for detection
- Inform the CERT team
- Research threat intelligence and potential adversaries
- Utilize threat intelligence to apply Big Data techniques
C. 1. Obtain the latest IOCs from the open source repositories
- Perform a sweep across the network to identify positive matches
- Sandbox any suspicious files
- Notify the CERT team to apply a future proof threat model
D. 1. Analyze the current threat intelligence
- Utilize information sharing to obtain the latest industry IOCs
- Perform a sweep across the network to identify positive matches
- Apply machine learning algorithms
D. 1. Analyze the current threat intelligence
- Utilize information sharing to obtain the latest industry IOCs
- Perform a sweep across the network to identify positive matches
- Apply machine learning algorithms
A software development team is conducting functional and user acceptance testing of internally developed web applications using a COTS solution. For automated testing, the solution uses valid user credentials from the enterprise directory to authenticate to each application. The solution stores the username in plain text and the corresponding password as an encoded string in a script within a file, located on a globally accessible network share. The account credentials used belong to the development team lead. To reduce the risks associated with this scenario while minimizing disruption to ongoing testing, which of the following are the BEST actions to take? (Choose two.)
- Restrict access to the network share by adding a group only for developers to the share’s ACL
- Implement a new COTS solution that does not use hard-coded credentials and integrates with directory services
- Obfuscate the username within the script file with encoding to prevent easy identification and the account used
- Provision a new user account within the enterprise directory and enable its use for authentication to the target applications. Share the username and password with all developers for use in their individual scripts
- Redesign the web applications to accept single-use, local account credentials for authentication
- Restrict access to the network share by adding a group only for developers to the share’s ACL
- Implement a new COTS solution that does not use hard-coded credentials and integrates with directory services
A security consultant is attempting to discover if the company is utilizing databases on client machines to store the customer data. The consultant reviews the following information:
— image of protocol, local/foreign IP address, and connection status —
Which of the following commands would have provided this output?
- arp -s
- netstat -a
- ifconfig -arp
- sqlmap -w
- netstat -a
Management is reviewing the results of a recent risk assessment of the organization’s policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background checks and use a third-party to perform background checks on all new employees.
Which of the following risk management strategies has the organization employed?
- Transfer
- Mitigate
- Accept
- Avoid
- Reject
- Mitigate
An advanced threat emulation engineer is conducting testing against a client’s network. The engineer conducts the testing in as realistic a manner as possible. Consequently, the engineer has been gradually ramping up the volume of attacks over a long period of time. Which of the following combinations of techniques would the engineer MOST likely use in this testing? (Choose three.)
- Black box testing
- Gray box testing
- Code review
- Social engineering
- Vulnerability assessment
- Pivoting
- Self-assessment
- White teaming
- External auditing
- Black box testing
- Vulnerability assessment
- Pivoting
A newly hired systems administrator is trying to connect a new and fully updated, but very customized, Android device to access corporate resources. However, the MDM enrollment process continually fails. The administrator asks a security team member to look into the issue. Which of the following is the MOST likely reason the MDM is not allowing enrollment?
- The OS version is not compatible
- The OEM is prohibited
- The device does not support FDE
- The device is rooted
- The device is rooted
A security administrator wants to allow external organizations to cryptographically validate the company’s domain name in email messages sent by employees. Which of the following should the security administrator implement?
- SPF
- S/MIME
- TLS
- DKIM
- SPF
https: //en.wikipedia.org/wiki/DMARC
An organization is preparing to develop a business continuity plan. The organization is required to meet regulatory requirements relating to confidentiality and availability, which are well-defined. Management has expressed concern following initial meetings that the organization is not fully aware of the requirements associated with the regulations. Which of the following would be MOST appropriate for the project manager to solicit additional resources for during this phase of the project?
- After-action reports
- Gap assessment
- Security requirements traceability matrix
- Business impact assessment
- Risk analysis
- Gap assessment
An agency has implemented a data retention policy that requires tagging data according to type before storing it in the data repository. The policy requires all business emails be automatically deleted after two years. During an open records investigation, information was found on an employee’s work computer concerning a conversation that occurred three years prior and proved damaging to the agency’s reputation. Which of the following MOST likely caused the data leak?
- The employee manually changed the email client retention settings to prevent deletion of emails
- The file that contained the damaging information was mistagged and retained on the server for longer than it should have been
- The email was encrypted and an exception was put in place via the data classification application
- The employee saved a file on the computer’s hard drive that contained archives of emails, which were more than two years old
- The employee saved a file on the computer’s hard drive that contained archives of emails, which were more than two years old
A company is acquiring incident response and forensic assistance from a managed security service provider in the event of a data breach. The company has selected a partner and must now provide required documents to be reviewed and evaluated. Which of the following documents would BEST protect the company and ensure timely assistance? (Choose two.)
- RA
- BIA
- NDA
- RFI
- RFQ
- MSA
- NDA
- MSA
A security architect is implementing security measures in response to an external audit that found vulnerabilities in the corporate collaboration tool suite. The report identified the lack of any mechanism to provide confidentiality for electronic correspondence between users and between users and group mailboxes. Which of the following controls would BEST mitigate the identified vulnerability?
- Issue digital certificates to all users, including owners of group mailboxes, and enable S/MIME
- Federate with an existing PKI provider, and reject all non-signed emails
- Implement two-factor email authentication, and require users to hash all email messages upon receipt
- Provide digital certificates to all systems, and eliminate the user group or shared mailboxes
- Issue digital certificates to all users, including owners of group mailboxes, and enable S/MIME
Which of the following BEST represents a risk associated with merging two enterprises during an acquisition?
- The consolidation of two different IT enterprises increases the likelihood of the data loss because there are now two backup systems
- Integrating two different IT systems might result in a successful data breach if threat intelligence is not shared between the two enterprises
- Merging two enterprise networks could result in an expanded attack surface and could cause outages if trust and permission issues are not handled carefully
- Expanding the set of data owners requires an in-depth review of all data classification decisions, impacting availability during the review
- Merging two enterprise networks could result in an expanded attack surface and could cause outages if trust and permission issues are not handled carefully
Two competing companies experienced similar attacks on their networks from various threat actors. To improve response times, the companies wish to share some threat intelligence about the sources and methods of attack. Which of the following business documents would be BEST to document this engagement?
- Business partnership agreement
- Memorandum of understanding
- Service-level agreement
- Interconnection security agreement
- Interconnection security agreement
https: //nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-47.pdf
A software development team has spent the last 18 months developing a new web-based front-end that will allow clients to check the status of their orders as they proceed through manufacturing. The marketing team schedules a launch party to present the new application to the client base in two weeks. Before the launch, the security team discovers numerous flaws that may introduce dangerous vulnerabilities, allowing direct access to a database used by manufacturing. The development team did not plan to remediate these vulnerabilities during development. Which of the following SDLC best practices should the development team have followed?
- Implementing regression testing
- Completing user acceptance testing
- Verifying system design documentation
- Using a SRTM
- Using a SRTM
Legal authorities notify a company that its network has been compromised for the second time in two years. The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks. Which of the following would have allowed the security team to use historical information to protect against the second attack?
- Key risk indicators
- Lessons learned
- Recovery point objectives
- Tabletop exercise
- Lessons learned
A team is at the beginning stages of designing a new enterprise-wide application. The new application will have a large database and require a capital investment in hardware. The Chief Information Officer (СIO) has directed the team to save money and reduce the reliance on the datacenter, and the vendor must specialize in hosting large databases in the cloud. Which of the following cloud-hosting options would BEST meet these needs?
- Multi-tenancy SaaS
- Hybrid IaaS
- Single-tenancy PaaS
- Community IaaS
- Single-tenancy PaaS
A company wants to extend its help desk availability beyond business hours. The Chief Information Officer (CIO) decides to augment the help desk with a third-party service that will answer calls and provide Tier 1 problem resolution, such as password resets and remote assistance. The security administrator implements the following firewall change:
PERMIT TCP FROM 74.23.2.4 TO 192.168.20.20 PORT 80
PERMIT TCP FROM 74.23.2.4 TO 192.168.20.20 PORT 636
PERMIT TCP FROM 74.23.2.4 TO 192.168.20.20 PORT 5800
PERMIT TCP FROM 74.23.2.4 TO 192.168.20.20 PORT 1433
The administrator provides the appropriate path and credentials to the third-party company. Which of the following technologies is MOST likely being used to provide access to the third company?
- LDAP
- WAYF
- OpenID
- RADIUS
- SAML
- LDAP
An architect was recently hired by a power utility to increase the security posture of the company’s power generation and distribution sites. Upon review, the architect identifies legacy hardware with highly vulnerable and unsupported software driving critical operations. These systems must exchange data with each other, be highly synchronized, and pull from the Internet time sources. Which of the following architectural decisions would BEST reduce the likelihood of a successful attack without harming operational capability? (Choose two.)
- Isolate the systems on their own network
- Install a firewall and IDS between systems and the LAN
- Employ own stratum-0 and stratum-1 NTP servers
- Upgrade the software on critical systems
- Configure the systems to use government-hosted NTP servers
- Install a firewall and IDS between systems and the LAN
- Configure the systems to use government-hosted NTP servers
An organization is currently working with a client to migrate data between a legacy ERP system and a cloud-based ERP tool using a global PaaS provider. As part of the engagement, the organization is performing data deduplication and sanitization of client data to ensure compliance with regulatory requirements. Which of the following is the MOST likely reason for the need to sanitize the client data?
- Data aggregation
- Data sovereignty
- Data isolation
- Data volume
- Data analytics
- Data sovereignty
Given the code snippet below:
— image of C++ code —
Which of the following vulnerability types in the MOST concerning?
- Only short usernames are supported, which could result in brute forcing of credentials.
- Buffer overflow in the username parameter could lead to a memory corruption vulnerability.
- Hardcoded usernames with different code paths taken depend on which user is entered.
- Format string vulnerability is present for admin users but not for standard users.
- Buffer overflow in the username parameter could lead to a memory corruption vulnerability.
To meet a SLA, which of the following document should be drafted, defining the company’s internal interdependent unit responsibilities and delivery timelines.
- BPA
- OLA
- MSA
- MOU
- OLA
OLA is an agreement between the internal support groups of an institution that supports SLA. According to the Operational Level Agreement, each internal support group has certain responsibilities to the other group. The OLA clearly depicts the performance and relationship of the internal service groups. The main objective of OLA is to ensure that all the support groups provide the intended Service Level Agreement.
A security analyst sees some suspicious entries in a log file from a web server website, which has a form that allows customers to leave feedback on the company’s products. The analyst believes a malicious actor is scanning the web form. To know which security controls to put in place, the analyst first needs to determine the type of activity occurring to design a control. Given the log below:
— image of log —
Which of the following is the MOST likely type of activity occurring?
- SQL injection
- XSS scanning
- Fuzzing
- Brute forcing
- Brute forcing
An organization has established the following controls matrix:
— image —
The following control sets have been defined by the organization and are applied in aggregate fashion:
- Systems containing PII are protected with the minimum control set.
- Systems containing medical data are protected at the moderate level.
- Systems containing cardholder data are protected at the high level.
The organization is preparing to deploy a system that protects the confidentially of a database containing PII and medical data from clients. Based on the controls classification, which of the following controls would BEST meet these requirements?
- Proximity card access to the server room, context-based authentication, UPS, and full-disk encryption for the database server.
- Cipher lock on the server room door, FDE, surge protector, and static analysis of all application code.
- Peer review of all application changes, static analysis of application code, UPS, and penetration testing of the complete system.
- Intrusion detection capabilities, network-based IPS, generator, and context-based authentication.
- Intrusion detection capabilities, network-based IPS, generator, and context-based authentication.
A company’s existing forward proxies support software-based TLS decryption, but are currently at 60% load just dealing with AV scanning and content analysis for HTTP traffic. More than 70% outbound web traffic is currently encrypted. The switching and routing network infrastructure precludes adding capacity, preventing the installation of a dedicated TLS decryption system. The network firewall infrastructure is currently at 30% load and has software decryption modules that can be activated by purchasing additional license keys. An existing project is rolling out agent updates to end-user desktops as part of an endpoint security refresh.
Which of the following is the BEST way to address these issues and mitigate risks to the organization?
- Purchase the SSL decryption license for the firewalls and route traffic back to the proxies for end-user categorization and malware analysis.
- Roll out application whitelisting to end-user desktops and decommission the existing proxies, freeing up network ports.
- Use an EDP solution to address the malware issue and accept the diminishing role of the proxy for URL categorization in the short team.
- Accept the current risk and seek possible funding approval in the next budget cycle to replace the existing proxies with ones with more capacity.
- Purchase the SSL decryption license for the firewalls and route traffic back to the proxies for end-user categorization and malware analysis.
A recent CRM upgrade at a branch office was completed after the desired deadline. Several technical issues were found during the upgrade and need to be discussed in depth before the next branch office is upgraded.
Which of the following should be used to identify weak processes and other vulnerabilities?
- Gap analysis
- Benchmarks and baseline results
- Risk assessment
- Lessons learned report
- Lessons learned report
A threat advisory alert was just emailed to the IT security staff. The alert references specific types of host operating systems that can allow an unauthorized person to access files on a system remotely. A fix was recently published, but it requires a recent endpoint protection engine to be installed prior to running the fix.
Which of the following MOST likely need to be configured to ensure the system are mitigated accordingly? (Select two.)
- Antivirus
- HIPS
- Application whitelisting
- Patch management
- Group policy implementation
- Firmware updates
- Antivirus
- Patch management
A network engineer is attempting to design-in resiliency characteristics for an enterprise network’s VPN services.
If the engineer wants to help ensure some resilience against zero-day vulnerabilities exploited against the VPN implementation, which of the following decisions would BEST support this objective?
- Implement a reverse proxy for VPN traffic that is defended and monitored by the organization’s SOC with near-real-time alerting to administrators.
- Subscribe to a managed service provider capable of supporting the mitigation of advanced DDoS attacks on the enterprise’s pool of VPN concentrators.
- Distribute the VPN concentrators across multiple systems at different physical sites to ensure some backup services are available in the event of primary site loss.
- Employ a second VPN layer concurrently where the other layer’s cryptographic implementation is sourced from a different vendor.
- Employ a second VPN layer concurrently where the other layer’s cryptographic implementation is sourced from a different vendor.
An information security officer is responsible for one secure network and one office network. Recent intelligence suggests there is an opportunity for attackers to gain access to the secure network due to similar login credentials across networks. To determine the users who should change their information, the information security officer uses a tool to scan a file with hashed values on both networks and receives the following data:
— image —
Which of the following tools was used to gather this information from the hashed values in the file?
- Vulnerability scanner
- Fuzzer
- MD5 generator
- Password cracker
- Protocol analyzer
- Protocol analyzer
A Chief Information Security Officer (CISO) is reviewing and revising system configuration and hardening guides that were developed internally and have been used several years to secure the organization’s systems. The CISO knows improvements can be made to the guides.
Which of the following would be the BEST source of reference during the revision process?
- CVE database
- Internal security assessment reports
- Industry-accepted standards
- External vulnerability scan reports
- Vendor-specific implementation guides
- Vendor-specific implementation guides
Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic records for 2000 sales force employees. Source records will be email, PC, network shares, and applications.
After all restrictions have been lifted, which of the following should the information manager review?
- Data retention policy
- Legal hold
- Chain of custody
- Scope statement
- Data retention policy