Question 91
Sam, an employee of a multinational company, sends emails to third-party organizations with a spoofed email address of his organization.
How can you categorize this type of incident?
Question 92
To respond to DDoS attacks; one of the following strategies can be used:
Question 93
Michael is a part of the computer incident response team of a company. One of his responsibilities is to handle email incidents. The company receives an email from an unknown source, and one of the steps that he needs to take is to check the validity of the email.
Which of the following tools should he use?
Question 94
Employee monitoring tools are mostly used by employers to find which of the following?
Question 95
The steps followed to recover computer systems after an incident are: