Which of the following prevents malicious programs from attacking a system?
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company data. Which of the following is the most important step for you to take in preserving the chain of custody?
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
Which of the following directories cannot be placed out of the root filesystem?Each correct answer represents a complete solution. Choose all that apply.
Which of the following needs to be documented to preserve evidences for presentation in court?