Question 51
Which type of data collection requires the largest amount of storage space?
Question 52
An engineer is investigating a case of the unauthorized usage of the "Tcpdump" tool. The analysis revealed that a malicious insider attempted to sniff traffic on a specific interface. What type of information did the malicious insider attempt to obtain?
Question 53
What is a purpose of a vulnerability management framework?