Question 51

Which type of data collection requires the largest amount of storage space?
  • Question 52

    An engineer is investigating a case of the unauthorized usage of the "Tcpdump" tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?
  • Question 53

    What is a purpose of a vulnerability management framework?