- (Topic 3)
Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?
Correct Answer:D
- (Topic 3)
Which forensic investigating concept trails the whole incident from how the attack began to how the victim was affected?
Correct Answer:B
- (Topic 1)
During first responder procedure you should follow all laws while collecting the evidence, and contact a computer forensic examiner as soon as possible
Correct Answer:A
- (Topic 3)
Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However law enforcement agencies were recording his every activity and this was later presented as evidence. The organization had used a virtual environment to trap Jones. What is a virtual environment?
Correct Answer:B
- (Topic 1)
Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a predefined interval of time.
Which type of correlation will you use if your organization wants to use different OS and network hardware platforms throughout the network?
Correct Answer:B