Question 6

Which of the following helps to ensure the confidentiality of data in computer operations?
  • Question 7

    Which of the following is a common technique used by malware to evade detection?
  • Question 8

    During the incident handling process, what is the main purpose of conducting a post-incident analysis?
  • Question 9

    Which command-line tool is used for network traffic capture and packet analysis?
  • Question 10

    What is the purpose of a firewall in a network security infrastructure?