Question 31

Insiders understand corporate business functions. What is the correct sequence of activities performed by
Insiders to damage company assets:
  • Question 32

    A software application in which advertising banners are displayed while the program is running that delivers
    ads to display pop-up windows or bars that appears on a computer screen or browser is called:
  • Question 33

    What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP addresses on a victim computer to identify the established connections on it:
  • Question 34

    The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:
  • Question 35

    One of the goals of CSIRT is to manage security problems by taking a certain approach towards the
    customers' security vulnerabilities and by responding effectively to potential information security incidents.
    Identify the incident response approach that focuses on developing the infrastructure and security processes
    before the occurrence or detection of an event or any incident: