Question 6
Which of the following helps to ensure the confidentiality of data in computer operations?
Question 7
Which of the following is a common technique used by malware to evade detection?
Question 8
During the incident handling process, what is the main purpose of conducting a post-incident analysis?
Question 9
Which command-line tool is used for network traffic capture and packet analysis?
Question 10
What is the purpose of a firewall in a network security infrastructure?