Which type of forensics can help you determine whether a system is truly under attack or a user has inadvertently installed an untested patch or custom program?
a. Intrusion forensics
b. Network forensics
c. DDoS forensics
d. Traffic forensics
ANSWER: b
You might also like to view...
An implementation of the _________ interface configures the database connection and prepares query statements automatically.
a. ResultSet b. RowSet c. Both of the above d. Neither of the above
A __________ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.
A) ?bit ? B) ?product ? C) ?stream D) ?block
By default, new tab stops that you set on the ruler are ____________________-aligned.
Fill in the blank(s) with the appropriate word(s).
An administrator needs to view packets and decode and analyze their contents. What type of application should the administrator use?
A. application analyzer B. protocol analyzer C. threat profiler D. system analyzer