An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?
Which of the following switches of the XCOPY command copies attributes while copying files?
You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting attack on your company's Web site. Which of the following methods of investigation can you use to accomplish the task?Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?Each correct answer represents a complete solution. Choose all that apply.
The incident response team has turned the evidence over to the forensic team. Now, it is the time to begin looking for the ways to improve the incident response process for next time. What are the typical areas for improvement?Each correct answer represents a complete solution. Choose all that apply.