organization has developed its first-ever computer security incident response procedure 1. A security manager has been asked to investigate employee behavior on the part of a senior manager. The investigation has shown that the subject has suffered a serious lapse in judgment and has violated the organizationâ€™s code of conduct. The security manager has been asked to keep the results of the investigation a secret. How should the security manager respond? a. Leak the results of the investigation to the media b. Cover up the results of the investigation c. Deliver the results of the investigation and recommendations for next steps to his superiors d. Notify law enforcement 2. A forensics investigator has been asked to examine the workstation used by an employee who has been known to misbehave in the past. This investigation is related to more potential misconduct. What approach should the investigator take in this new investigation? a. Approach this investigation objectively, without regard to the history of this employeeâ€™s conduct b. Approach this investigation subjectively, given the history of this employeeâ€™s conduct c. Assume the employee is guilty and search for evidence to support this d. Assume the employee is innocent and search for evidence to refute this 3. The allegation that an employee has violated company policy by downloading child pornography onto a company workstation should result in: a. Notification of affected customers b. Termination of the employee c. The declaration of a security incident d. A forensic investigation and possible disciplinary action 4. An organization has developed its first-ever computer security incident response procedure. What type of test should be undertaken first? a. Parallel test b. Simulation c. Walkthrough d. Document review 5. An organizationâ€™s security incident management strategy consists of response procedures to be used when an incident occurs. What other measures should the organization undertake: a. None b. Develop proactive procedures to aid in incident prevention c. Train selected personnel on incident response procedures d. Partner with law enforcement on incident response procedures Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help
We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique.
FALL 2018 HOMEWORK HELP| ASSIGNMENT HELP,…