What is the role of an authorized requester?
What will be an ideal response?
ANSWER: Businesses are advised to specify an authorized requester who has the power to initiate investigations. Executive management should define a policy to avoid conflicts from competing interests in organizations. In large organizations, competition for funding or management support can become so fierce that people might create false allegations of misconduct to prevent competing departments from delivering a proposal for the same source of funds. To avoid inappropriate investigations, executive management must also define and limit who’s authorized to request a computer investigation and forensics analysis. Generally, the fewer groups with authority to request a computer investigation, the better.
You might also like to view...
The volatility attribute of a file specifies ________.
a) the frequency with which additions and deletions are made to a file b) whether the file is stored on a volatile medium c) the percentage of a file’s records accessed during a given period of time d) restrictions placed on access to data in a file
Which rootkit intercepts system calls and modifies them as required?
a. Flea b. T0rm c. Adorn d. LKM
To switch to the root user home directory, you would use the _____ command.
A. su B. su - C. id D. whoami
The type of security threat that uses computers or other networks to accept and pass on viruses is called
A. phishing B. botnets C. logic bomb D. man-in-the-middle