Question 86
Malicious software programs that infect computers and com up to r delete the data on them.
The above-mentioned statement defines which of the following terms?
Question 87
Computer forensics is methodical series of techniques and procedures for gathering evidence from computing equipment, various storage devices and or digital media that can be presented in a course of law in a coherent and meaningful format. Which one of the following is an appropriate flow of steps in the computer forensics process:
Question 88
Rose is an incident-handler and is responsible for detecting and eliminating any kind of scanning attempts over the network by malicious threat actors. Rose uses Wire shark to sniff the network and detect any malicious activities going on.
Which of the following Wireshark filters can be used by her to detect TCP Xmas scan attempt by the attacker?
Question 89
Which of the following details are included in the evidence bags?
Question 90
Incident may be reported using/ by: