Question 36

To respond to DDoS attacks; one of the following strategies can be used:
  • Question 37

    A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the worm include:
  • Question 38

    The person who offers his formal opinion as a testimony about a computer crime incident in the court of law is known as:
  • Question 39

    Preventing the incident from spreading and limiting the scope of the incident is known as:
  • Question 40

    Business Continuity planning includes other plans such as: