CIMA Risk Management P3 Question # 78 Topic 8 Discussion

CIMA Risk Management P3 Question # 78 Topic 8 Discussion

P3 Exam Topic 8 Question 78 Discussion:
Question #: 78
Topic #: 8

An IT security consultant has been asked to conduct a forensic analysis of a client’s systems after the discovery of a system breach The consultant discovered several fake user accounts that appeared to have been created by the perpetrators of the breach Before deleting the accounts, the consultant took care to copy as much detail as possible concerning the accounts.

Which TWO of the following are valid explanations for the consultant's decision to copy the details concerning the fake accounts'?


A.

The details could be of value as evidence in any subsequent criminal trial.


B.

If the fake accounts reappear after deletion that will be a warning that the breach has recurred.


C.

The client could use the account details to target a breach of the perpetrator's systems.


D.

The consultant can charge more for the time spent analysing the fake accounts.


E.

The analysis of the accounts might help the consultant understand the motive for the breach.


Get Premium P3 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.