00:00

QUESTION 11

The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:

Correct Answer: B

QUESTION 12

A Malicious code attack using emails is considered as:

Correct Answer: D

QUESTION 13

In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the system is known as:

Correct Answer: B

QUESTION 14

Lack of forensic readiness may result in:

Correct Answer: D

QUESTION 15

Which of the following may be considered as insider threat(s):

Correct Answer: B