Question 1
How can the preservation of evidence be ensured during a cybersecurity investigation?
Question 2
What is one of the ethical principles that guide the code of ethics for cybersecurity professionals?
Question 3
What is an attack vector in cybersecurity?
Question 4
Which of the following best defines the concept of preserving digital evidence?
Question 5
Which of the following is an example of an active vulnerability mitigation technique?