Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 198

Mary Smith

Wed, 19 Nov 2025

CISM—Certified Information Security Manager - Part 198

1. An unauthorized user gained access to a merchant's database server and customer credit card information. Which of the following would be the FIRST step to preserve and protect unauthorized intrusion activities?

A) Shut down and power off the server.
B) Duplicate the hard disk of the server immediately.
C) Isolate the server from the network.
D) Copy the database log file to a protected server.



2. Which of the following would be a MAJOR consideration for an organization defining its business continuity plan (BCP) or disaster recovery program (DRP)?

A) Setting up a backup site
B) Maintaining redundant systems
C) Aligning with recovery time objectives (RTOs)
D) Data backup frequency



3. Which of the following would be MOST appropriate for collecting and preserving evidence?

A) Encrypted hard drives
B) Generic audit software
C) Proven forensic processes
D) Log correlation software



4. Of the following, which is the MOST important aspect of forensic investigations?

A) The independence of the investigator
B) Timely intervention
C) Identifying the perpetrator
D) Chain of custody



5. In the course of examining a computer system for forensic evidence, data on the suspect media were inadvertently altered. Which of the following should have been the FIRST course of action in the investigative process?

A) Perform a backup of the suspect media to new media.
B) Perform a bit-by-bit image of the original media source onto new media.
C) Make a copy of all files that are relevant to the investigation.
D) Run an error-checking program on all logical drives to ensure that there are no disk errors.



1. Right Answer: C
Explanation: Isolating the server will prevent further intrusions and protect evidence of intrusion activities left in memory and on the hard drive. Some intrusion activities left in virtual memory may be lost if the system is shut down. Duplicating the hard disk will only preserve the evidence on the hard disk, not the evidence in virtual memory, and will not prevent further unauthorized access attempts. Copying the database log file to a protected server will not provide sufficient evidence should the organization choose to pursue legal recourse.

2. Right Answer: C
Explanation: BCP, DRP should align with business RTOs. The RTO represents the amount of time allowed for the recovery of a business function or resource after a disaster occurs. The RTO must be taken into consideration when prioritizing systems for recovery efforts to ensure that those systems that the business requires first are the ones that are recovered first.

3. Right Answer: C
Explanation: When collecting evidence about a security incident, it is very important to follow appropriate forensic procedures to handle electronic evidence by a method approved by local jurisdictions. All other options will help when collecting or preserving data about the incident; however, these data might not be accepted as evidence in a court of law if they are not collected by a method approved by local jurisdictions.

4. Right Answer: D
Explanation: Establishing the chain of custody is one of the most important steps in conducting forensic investigations since it preserves the evidence in a manner that is admissible in court. The independence of the investigator may be important, but is not the most important aspect. Timely intervention is important for containing incidents, but not as important for forensic investigation. Identifying the perpetrator is important, but maintaining the chain of custody is more important in order to have the perpetrator convicted in court.

5. Right Answer: B
Explanation: The original hard drive or suspect media should never be used as the source for analysis. The source or original media should be physically secured and only used as the master to create a bit-by-bit image. The original should be stored using the appropriate procedures, depending on location. The image created for forensic analysis should be used. A backup does not preserve 100 percent of the data, such as erased or deleted files and data in slack space '' which may be critical to the investigative process. Once data from the source are altered, they may no longer be admissible in court. Continuing the investigation, documenting the date, time and data altered, are actions that may not be admissible in legal proceedings. The organization would need to know the details of collecting and preserving forensic evidence relevant to their jurisdiction.

0 Comments

Leave a comment