ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you categorize this type of account?
Correct Answer:
A
Which of the following is NOT one of the techniques used to respond to insider threats:
Correct Answer:
B
In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the system is known as:
Correct Answer:
B
The correct order or sequence of the Computer Forensic processes is:
Correct Answer:
B
Computer forensics is methodical series of techniques and procedures for gathering evidence from computing equipment, various storage devices and or digital media that can be presented in a course of law in a coherent and meaningful format. Which one of the following is an appropriate flow of steps in the computer forensics process:
Correct Answer:
D