ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 40 - CS0-003 discussion

Report
Export

A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user's workstation, to build the case for the investigation. Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?

A.
Create a timeline of events detailinq the date stamps, user account hostname and IP information associated with the activities
Answers
A.
Create a timeline of events detailinq the date stamps, user account hostname and IP information associated with the activities
B.
Ensure that the case details do not reflect any user-identifiable information Password protect the evidence and restrict access to personnel related to the investigation
Answers
B.
Ensure that the case details do not reflect any user-identifiable information Password protect the evidence and restrict access to personnel related to the investigation
C.
Create a code name for the investigation in the ticketing system so that all personnel with access will not be able to easily identity the case as an HR-related investigation
Answers
C.
Create a code name for the investigation in the ticketing system so that all personnel with access will not be able to easily identity the case as an HR-related investigation
D.
Notify the SOC manager for awareness after confirmation that the activity was intentional
Answers
D.
Notify the SOC manager for awareness after confirmation that the activity was intentional
Suggested answer: B

Explanation:

The best way to ensure that the investigation complies with HR or privacy policies is to ensure that the case details do not reflect any user-identifiable information, such as name, email address, phone number, or employee ID. This can help protect the privacy and confidentiality of the user and prevent any potential discrimination or retaliation. Additionally, password protecting the evidence and restricting access to personnel related to the investigation can help preserve the integrity and security of the evidence and prevent any unauthorized or accidental disclosure or modification.

asked 02/10/2024
Riaan Cilliers
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first