ExamGecko
Home / Isaca / Cybersecurity Audit / Practice Test 2
Ask Question

Isaca Cybersecurity Audit Practice Test 2

Add to Whishlist
00:00:00
Show Answer
Report Issue   Restart test

Question 1 / 35

Using digital evidence to provide validation that an attack has actually occurred is an example of;

computer forensic
computer forensic
extraction.
extraction.
identification.
identification.
data acquisition.
data acquisition.
Comment (0)
Suggested answer: A
Explanation:

Using digital evidence to provide validation that an attack has actually occurred is an example of computer forensics. This is because computer forensics is a discipline that involves the identification, preservation, analysis, and presentation of digital evidence from various sources, such as computers, networks, mobile devices, etc., to support investigations of cyber incidents or crimes. Computer forensics helps to provide validation that an attack has actually occurred, by examining the digital traces or artifacts left by the attackers on the compromised systems or devices, and by reconstructing the sequence and timeline of events that led to the attack. The other options are not examples of using digital evidence to provide validation that an attack has actually occurred, but rather different techniques or processes that are related to computer forensics, such as extraction (B), identification C, or data acquisition (D).

asked 18/09/2024
luis gilberto correa betancur
51 questions


Isaca Cybersecurity Audit Practice Tests