1. When investigating a virus, what is the first step?
Check firewall logs.
Check IDS logs.
Document the virus.
Trace the origin of the virus.
2. Which of the following crimes is most likely to leave email evidence?
Cyberstalking
DoS
Logic bomb
Fraud
3. Where would you seek evidence that ophcrack had been used on a Windows Server 2008 machine?
In the logs of the server; look for the reboot of the system
In the logs of the server; look for the loading of a CD
In the firewall logs
In the IDS logs
4. Logic bombs are often perpetrated by ________.
identity thieves
disgruntled employees
terrorists
hackers
5. Spyware is legal.
True
False
6. It is legal for employers to monitor work computers.
True
False
7. What is the primary reason to take cyberstalking seriously?
It can damage your system.
It can be annoying and distracting.
It can be a prelude to real-world violence.
It can be part of identity theft.
8. What is the starting point for investigating denial of service attacks?
Firewall logs
Email headers
System logs
Tracing the packets