What would be the best course of action to follow?
A security analyst asks you to look at the traffic he has gathered, and you find several Push flags within the
capture. It seems the packets are sent to an unknown Internet Address (IP) that is not in your network from one
of your own IP addresses which is a financial database that is critical and must remain up and running 24×7.
This traffic was noticed in the middle of the day. What would be the best course of action to follow?
Which of the following is the BEST way to detect softwa…
Which of the following is the BEST way to detect software license violations?
which of the following exceptions would have no bearing…
Under the Business Exemption Rule to the hearsay evidence, which of the following exceptions would have no
bearing on the inadmissibility of audit logs and audit trails in a court of law?
What is defined as inference of information from other,…
What is defined as inference of information from other, intermediate, relevant facts?
Which of the following is not a form of passive attack?
Which of the following is not a form of passive attack?
Due care is not related to:
Due care is not related to:
Which of the following would best describe secondary ev…
Which of the following would best describe secondary evidence?
Which of the following is NOT a Generally Accepted Syst…
Which of the following is NOT a Generally Accepted System Security Principle (GASSP)?
Computer-generated evidence is considered:
Computer-generated evidence is considered:
what rule is concerned with the legality of how the evi…
Within the legal domain what rule is concerned with the legality of how the evidence was gathered?
