Question 76
During which phase of the forensic process are tools and techniques used to extract information from the collected data?
Question 77
What is the difference between an attack vector and attack surface?
Question 78
Which data type is necessary to get information about source/destination ports?
Question 79
What is a difference between inline traffic interrogation and traffic mirroring?
Question 80
Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?