Question 6

One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.
What system from the following does NOT natively support syslog events?
  • Question 7

    James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.
    What type of software programme is this?
  • Question 8

    Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS contract?
  • Question 9

    Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
    1. Intellectual Property Rights.
    2. Protection of Organisational Records
    3. Forensic recovery of data.
    4. Data Deduplication.
    5. Data Protection & Privacy.
  • Question 10

    When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?