Question 11
Which of the following are well-known methods that are used to protect evidence during the forensics process?
(Choose three.)
(Choose three.)
Question 12
Which of the following does the command nmap -open 10.10.10.3 do?
Question 13
Detailed step-by-step instructions to follow during a security incident are considered:
Question 14
A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following would be the BEST action to take to plan for this kind of attack in the future?
Question 15
When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use?