Question 11

Which of the following are well-known methods that are used to protect evidence during the forensics process?
(Choose three.)
  • Question 12

    Which of the following does the command nmap -open 10.10.10.3 do?
  • Question 13

    Detailed step-by-step instructions to follow during a security incident are considered:
  • Question 14

    A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following would be the BEST action to take to plan for this kind of attack in the future?
  • Question 15

    When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use?