A bank stores and processes sensitive privacy information related to home loans. However, auditing has never
been enabled on the system.
What is the first step that the bank should take before enabling the audit feature?
A consultant has been hired by the V.P. of a large financial organization to assess the company's security
posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer.
What is the consultant's obligation to the financial organization?
A computer technician is using a new version of a word processing software package when it is discovered that
a special sequence of characters causes the entire computer to crash. The technician researches the bug and
discovers that no one else experienced the problem.
What is the appropriate next step?
The intrusion detection system at a software development company suddenly generates multiple alerts
regarding attacks against the company's external webserver, VPN concentrator, and DNS servers.
What should the security team do to determine which alerts to check first?