Question 36
To respond to DDoS attacks; one of the following strategies can be used:
Question 37
A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the worm include:
Question 38
The person who offers his formal opinion as a testimony about a computer crime incident in the court of law is known as:
Question 39
Preventing the incident from spreading and limiting the scope of the incident is known as:
Question 40
Business Continuity planning includes other plans such as:
