Question 71
What is the difference between deep packet inspection and stateful inspection?
Question 72
What is an example of social engineering attacks?
Question 73
What is a difference between data obtained from Tap and SPAN ports?
Question 74
An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?
Question 75
What is personally identifiable information that must be safeguarded from unauthorized access?