ExamGecko
Question list
Search
Search

Related questions

Question 236 - CISA discussion

Report
Export

An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?

A.
An imaging process was used to obtain a copy of the data from each computer.
Answers
A.
An imaging process was used to obtain a copy of the data from each computer.
B.
The legal department has not been engaged.
Answers
B.
The legal department has not been engaged.
C.
The chain of custody has not been documented.
Answers
C.
The chain of custody has not been documented.
D.
Audit was only involved during extraction of the Information
Answers
D.
Audit was only involved during extraction of the Information
Suggested answer: C

Explanation:

The chain of custody has not been documented is a finding that should be of greatest concern for an IS auditor reviewing a forensic analysis process of an organization that has suffered a cyber attack. The chain of custody is a record of who handled, accessed, or modified the evidence during a forensic investigation. Documenting the chain of custody is essential to preserve the integrity, authenticity, and admissibility of the evidence in a court of law. The other options are less concerning findings that may not affect the validity or reliability of the forensic analysis process.Reference:

CISA Review Manual (Digital Version), Chapter 7, Section 7.51

CISA Review Questions, Answers & Explanations Database, Question ID 220

asked 18/09/2024
NEURONES TECHNOLOGIES
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first