A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large amounts of data using a combination of automated and manual methods. Identify the computer forensic process involved:
Correct Answer:C
A Malicious code attack using emails is considered as:
Correct Answer:D
Incident may be reported using/ by:
Correct Answer:D
Which of the following is an incident tracking, reporting and handling tool:
Correct Answer:B
In a DDoS attack, attackers first infect multiple systems, which are then used to attack a particular target directly. Those systems are called:
Correct Answer:C