Question 16

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)
  • Question 17

    Tcpdump is a tool that can be used to detect which of the following indicators of compromise?
  • Question 18

    If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?
  • Question 19

    During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?
  • Question 20

    Which of the following could be useful to an organization that wants to test its incident response procedures without risking any system downtime?