Which of the following is an appropriate flow of the incident recovery steps?
Correct Answer:
D
An adversary attacks the information resources to gain undue advantage is called:
Correct Answer:
B
A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control the victim’s system is called:
Correct Answer:
A
The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs is called:
Correct Answer:
B
The network perimeter should be configured in such a way that it denies all incoming and outgoing traffic/ services that are not required. Which service listed below, if blocked, can help in preventing Denial of Service attack?
Correct Answer:
D