Free 212-89 Exam Dumps

Question 11

A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large amounts of data using a combination of automated and manual methods. Identify the computer forensic process involved:

Correct Answer:C

Question 12

A Malicious code attack using emails is considered as:

Correct Answer:D

Question 13

Incident may be reported using/ by:

Correct Answer:D

Question 14

Which of the following is an incident tracking, reporting and handling tool:

Correct Answer:B

Question 15

In a DDoS attack, attackers first infect multiple systems, which are then used to attack a particular target directly. Those systems are called:

Correct Answer:C