Question 46

The Linux command used to make binary copies of computer media and as a disk imaging tool if given a raw disk device as its input is:
  • Question 47

    Authorized users with privileged access who misuse the corporate informational assets and directly affects the confidentiality, integrity, and availability of the assets are known as:
  • Question 48

    The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven
    language, performs real-time traffic analysis and packet logging is known as:
  • Question 49

    Multiple component incidents consist of a combination of two or more attacks in a system. Which of the
    following is not a multiple component incident?
  • Question 50

    A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated with computer security incidents. Identify the procedure that is NOT part of the computer risk policy?