Question 86

Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?
  • Question 87

    Which of the following is a method of gaining access to a system that bypasses normal authentication?
  • Question 88

    Which of the following statements about a Trojan horse are true?
    Each correct answer represents a complete solution. Choose two.
  • Question 89

    You run the following PHP script:
    <?php $name = mysql_real_escape_string($_POST["name"]);
    $password = mysql_real_escape_string($_POST["password"]); ?>
    What is the use of the mysql_real_escape_string() function in the above script.
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 90

    Fill in the blank with the appropriate name of the tool.
    ______ scans for rootkits by comparing SHA-1 hashes of important files with known good ones in online database.