PrepAway - Latest Free Exam Questions & Answers

Category: CISSP (v.6)

Briefing CISSP: Certified Information Systems Security Professional (update December 20th, 2017)

what is the greatest legal challenge to the use of this…

Researchers have recently developed a tool that imitates a 14-year-old on the Internet.
The authors developed a “Chatter Bot” that mimics conversation and treats the dissemination of personal
information as the goal to determine if the other participant in the conversation is a pedophile. The tool engages
people in conversation and uses artificial intelligence to check for inappropriate questions by the unsuspecting
human. If the human types too many suggestive responses to the “artificial” 14-year-old, the tool then notifies
the police. From a legal perspective, what is the greatest legal challenge to the use of this tool?

What would be the best course of action to follow?

A security analyst asks you to look at the traffic he has gathered, and you find several Push flags within the
capture. It seems the packets are sent to an unknown Internet Address (IP) that is not in your network from one
of your own IP addresses which is a financial database that is critical and must remain up and running 24×7.
This traffic was noticed in the middle of the day. What would be the best course of action to follow?


Page 2 of 12912345...102030...Last »