100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

(CCIM1) Crest Certified Incident Manager- Written Exam

Beoordeling
-
Verkocht
-
Pagina's
42
Cijfer
A+
Geüpload op
04-03-2025
Geschreven in
2024/2025

• Engagement Lifecycle Management: • Understanding the benefits and utility of incident response to clients. • Awareness of preparatory steps for potential incidents. • Structuring incident response engagements, including relevant processes and procedures. • Appropriate actions during incident investigations and actions to avoid to prevent evidence corruption. • Safe handling of malware and potentially malicious files. • Understanding limitations of system logs. • Incident Chronology: • Utilizing timelines to analyze event data. • Addressing time zone issues. • Interpreting system timestamps with images. • Law & Compliance: • Knowledge of pertinent legal issues, including: o Computer Misuse Act 1990 o Human Rights Act 1998 o Data Protection Act 2018 and GDPR o Police and Justice Act 2006 o Regulation of Investigatory Powers Act 2000 o Criminal Justice Act 2008 o Protection of Children Act 1978 o Sexual Offences Act 2008 o Digital Millennium Copyright Act and its implications for reverse engineering. • Understanding evidential integrity and chain of custody. • Awareness of sector-specific regulatory issues (e.g., FSA, PCI). • Situations requiring notification of third parties. • Engaging law enforcement appropriately. • Role and jurisdiction of CERTs. • Record Keeping, Interim Reporting & Final Results: • Understanding reporting requirements. • Importance of accurate and structured record-keeping during engagements. • Reporting vulnerabilities and organizational weaknesses encountered. • Maintaining an audit log of all commands/activities on compromised hosts. • Threat Assessment: • Understanding how threats translate to the client and the business context of incidents. • High-level methodologies surrounding threat assessment. • Attribution of attacks. • Knowledge of attacker motivations. • Identifying key individuals likely to be targeted in attacks.

Meer zien Lees minder
Instelling
Computers
Vak
Computers











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Computers
Vak
Computers

Documentinformatie

Geüpload op
4 maart 2025
Aantal pagina's
42
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

(CCIM1) Crest Certified Incident Manager- Written Exam
1. Which of the following best describes the purpose of engagement lifecycle management in incident
response?
Options: A) Planning marketing strategies, B) Structuring incident response engagements, C) Managing
financial audits, D) Overseeing software development.
Explanation: Engagement lifecycle management is focused on planning and structuring incident
response activities to ensure preparedness and effective execution during incidents.



2. In incident response, what is the primary benefit of clearly defined engagement processes?
Options: A) Enhancing product sales, B) Reducing investigation time, C) Increasing client trust and clarity,
D) Improving employee training.
Explanation: Well-defined engagement processes build client trust and clarity by outlining clear
procedures and expected actions during an incident.



3. What preparatory step is most critical before an incident occurs?
Options: A) Budget planning, B) Conducting risk assessments, C) Organizing company parties, D)
Updating the company website.
Explanation: Risk assessments help organizations prepare for potential incidents by identifying
vulnerabilities and necessary countermeasures.



4. Which action should be avoided during an incident investigation to maintain evidence integrity?
Options: A) Documenting every step, B) Making unauthorized changes to systems, C) Collecting system
logs, D) Securing affected systems.
Explanation: Unauthorized changes can corrupt evidence and compromise the investigation, so they
must be avoided.



5. Why is safe handling of malware and suspicious files essential?
Options: A) To speed up processing, B) To prevent accidental infection or further damage, C) To improve
system performance, D) To enhance software functionality.
Explanation: Proper handling of malware prevents accidental spread and additional damage to systems
during investigations.



6. Which factor is a limitation of relying solely on system logs during an incident?
Options: A) They are always comprehensive, B) They may lack critical contextual details, C) They never
contain errors, D) They automatically provide attacker attribution.
Explanation: System logs can be incomplete or miss context, making them an insufficient sole source for
comprehensive incident analysis.

,7. How do timelines assist investigators in incident response?
Options: A) By simplifying financial audits, B) By providing a visual sequence of events, C) By increasing
system speed, D) By encrypting sensitive data.
Explanation: Timelines offer a visual and chronological view of events, aiding in the analysis of incident
progression.



8. What challenge can arise when analyzing system timelines from multiple sources?
Options: A) Overabundance of identical data, B) Time zone discrepancies, C) Too few entries, D)
Excessive encryption.
Explanation: Time zone issues can create confusion when correlating events across systems in different
regions.



9. In the context of incident chronology, why is it important to interpret system timestamps correctly?
Options: A) To schedule meetings, B) To correlate events accurately, C) To adjust system brightness, D)
To monitor employee attendance.
Explanation: Accurate interpretation of timestamps is crucial for establishing the order and timing of
events during an incident.



10. What does the Computer Misuse Act 1990 primarily address?
Options: A) Financial fraud, B) Unauthorized access and computer-related crimes, C) Environmental
protection, D) Employee privacy.
Explanation: The act focuses on criminalizing unauthorized computer access and misuse.



11. Which legislation governs the protection of personal data in the European context?
Options: A) Human Rights Act 1998, B) Data Protection Act 2018 and GDPR, C) Criminal Justice Act 2008,
D) Regulation of Investigatory Powers Act 2000.
Explanation: The Data Protection Act 2018 and GDPR establish the framework for protecting personal
data in Europe.



12. Under which act might reverse engineering be scrutinized due to copyright issues?
Options: A) Human Rights Act 1998, B) Digital Millennium Copyright Act, C) Police and Justice Act 2006,
D) Protection of Children Act 1978.
Explanation: The Digital Millennium Copyright Act sets strict limits on reverse engineering to protect
intellectual property rights.

,13. What is a key element of evidential integrity in incident investigations?
Options: A) Immediate public disclosure, B) Maintaining a proper chain of custody, C) Ignoring system
logs, D) Deleting sensitive files quickly.
Explanation: A robust chain of custody ensures that evidence remains credible and untampered
throughout the investigation.



14. Why is it critical to understand sector-specific regulations (e.g., PCI, FSA) during an incident?
Options: A) To improve marketing strategies, B) To ensure compliance with industry requirements, C) To
develop new products, D) To enhance employee productivity.
Explanation: Sector-specific regulations dictate how sensitive information must be handled, impacting
incident response and legal compliance.



15. What is the primary purpose of notifying third parties during an incident?
Options: A) To increase sales, B) To comply with legal and regulatory obligations, C) To promote a
product launch, D) To schedule training sessions.
Explanation: Timely notification of third parties is often required by law or regulation to manage risks
and comply with oversight.



16. When should law enforcement be engaged during an incident response?
Options: A) After a public announcement, B) When criminal activity is suspected, C) Only during routine
maintenance, D) When updating the company website.
Explanation: Engaging law enforcement is necessary when there is suspicion of criminal activity to
ensure proper legal processes are followed.



17. Which organization typically has jurisdiction over national incident response coordination?
Options: A) Local marketing teams, B) CERTs (Computer Emergency Response Teams), C) Financial
auditors, D) Human resources.
Explanation: CERTs are specialized teams that coordinate responses to cybersecurity incidents at a
national or sectoral level.



18. What is the importance of accurate record keeping during an incident engagement?
Options: A) To support internal promotions, B) To provide evidence for investigations and compliance,
C) To boost website traffic, D) To manage payroll processes.
Explanation: Detailed records support forensic investigations, ensure compliance with laws, and help in
understanding the incident timeline.



19. Which of the following best describes interim reporting in incident response?
Options: A) A final audit report, B) An ongoing update on incident status, C) A marketing summary, D) A

, training manual.
Explanation: Interim reporting provides regular updates on the progress of an incident investigation,
keeping stakeholders informed.



20. What does maintaining an audit log on compromised hosts help establish?
Options: A) Employee attendance, B) A historical record of all actions performed, C) Software updates,
D) Customer preferences.
Explanation: Audit logs provide a detailed account of activities, which is essential for understanding the
sequence of events during an incident.



21. In threat assessment, what is the primary goal when communicating with a client?
Options: A) To confuse the client with technical jargon, B) To translate technical threats into business
impacts, C) To delay decision-making, D) To encourage data deletion.
Explanation: Translating technical threats into understandable business risks helps clients appreciate the
potential impacts and prioritize responses.



22. What is a high-level methodology in threat assessment?
Options: A) Ignoring historical data, B) Conducting a comprehensive risk analysis, C) Focusing solely on
hardware, D) Delegating analysis to marketing.
Explanation: A comprehensive risk analysis that reviews historical trends and current vulnerabilities is
fundamental to threat assessment.



23. What factor is essential when attributing an attack to a specific actor?
Options: A) The attacker’s favorite color, B) Consistent evidence and attack patterns, C) The company’s
revenue figures, D) Employee satisfaction scores.
Explanation: Consistent evidence and established attack patterns are key in determining the likely
source or actor behind an attack.



24. How does the understanding of attacker motivations benefit an incident manager?
Options: A) By predicting stock market trends, B) By tailoring response strategies, C) By scheduling
employee shifts, D) By developing social media content.
Explanation: Knowing attacker motivations helps in anticipating future actions and tailoring
countermeasures appropriately.



25. Which step is crucial when preparing an incident response engagement?
Options: A) Scheduling vacations, B) Identifying potential vulnerabilities, C) Organizing a team lunch, D)
Redesigning the corporate logo.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
nikhiljain22 EXAMS
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
812
Lid sinds
1 jaar
Aantal volgers
30
Documenten
19531
Laatst verkocht
2 dagen geleden

3,5

187 beoordelingen

5
60
4
43
3
41
2
11
1
32

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen