The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:
Correct Answer:
B
A Malicious code attack using emails is considered as:
Correct Answer:
D
In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the system is known as:
Correct Answer:
B
Lack of forensic readiness may result in:
Correct Answer:
D
Which of the following may be considered as insider threat(s):
Correct Answer:
B