Question 76
The person who offers his formal opinion as a testimony about a computer crime incident in the court of law is known as:
Question 77
The region where the CSIRT is bound to serve and what does it and give service to is known as:
Question 78
The correct order or sequence of the Computer Forensic processes is:
Question 79
The network perimeter should be configured in such a way that it denies all incoming and outgoing traffic/
services that are not required. Which service listed below, if blocked, can help in preventing Denial of Service
attack?
Question 80
Risk is defined as the probability of the occurrence of an incident. Risk formulation generally begins with the likeliness of an event's occurrence, the harm it may cause and is usually denoted as Risk = ∑(events)X(Probability of occurrence)X?