Question 76

During which phase of the forensic process are tools and techniques used to extract information from the collected data?
  • Question 77

    What is the difference between an attack vector and attack surface?
  • Question 78

    Which data type is necessary to get information about source/destination ports?
  • Question 79

    What is a difference between inline traffic interrogation and traffic mirroring?
  • Question 80

    Which attack is the network vulnerable to when a stream cipher like RC4 is used twice with the same key?