Question 46
The Linux command used to make binary copies of computer media and as a disk imaging tool if given a raw disk device as its input is:
Question 47
Authorized users with privileged access who misuse the corporate informational assets and directly affects the confidentiality, integrity, and availability of the assets are known as:
Question 48
The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven
language, performs real-time traffic analysis and packet logging is known as:
language, performs real-time traffic analysis and packet logging is known as:
Question 49
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the
following is not a multiple component incident?
following is not a multiple component incident?
Question 50
A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated with computer security incidents. Identify the procedure that is NOT part of the computer risk policy?
