Question 66
Insiders understand corporate business functions. What is the correct sequence of activities performed by
Insiders to damage company assets:
Question 67
Which of the following is not the responsibility of first responders?
Question 68
Which of the following is NOT an image integrity tool?
Question 69
The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven
language, performs real-time traffic analysis and packet logging is known as:
Question 70
Unusual logins, accessing sensitive information not used for the job role, and the use of personal external storage drives on company assets are all signs of which of the following?