ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 725 - IIA-CIA-Part1 discussion

Report
Export

Which of the following is an example of computer forensic auditing?

A.

Testing compliance with policies that define acceptable computer use.

Answers
A.

Testing compliance with policies that define acceptable computer use.

B.

Assessing controls over allocation of IT assets in a specific location.

Answers
B.

Assessing controls over allocation of IT assets in a specific location.

C.

Recovering deleted communications and emails.

Answers
C.

Recovering deleted communications and emails.

D.

Logging targeted cybersecurity events on the organization's network.

Answers
D.

Logging targeted cybersecurity events on the organization's network.

Suggested answer: C

Explanation:

Computer forensic auditing is the process of collecting and analyzing digital evidence from electronic devices, such as computers, mobile phones, or tablets2.The purpose of computer forensic auditing is to investigate and resolve cases involving cybercrime, fraud, or other illegal or unethical activities3.One of the examples of computer forensic auditing is recovering deleted communications and emails, which can help to reveal the identity, motive, or modus operandi of the perpetrators or suspects4.

1: Forensic Audit Guide - Definition, Steps, Reasons3, p.22: What Is Computer Forensics?Types, Techniques, and Careers2, p.13: What Is a Forensic Audit, How Does It Work, and What Prompts It?5, p.14: IT Audit & Digital Forensics: How to use an IT audit to prepare for a computer forensics investigation6, p. 1

asked 03/11/2024
Sebastian Gryza
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first