Question 1 --------- Forensics is generally reactive and applied after an incide
ID: 3688173 • Letter: Q
Question
Question 1 --------- Forensics is generally reactive and applied after an incident has occurred
Question 2 Organization associated with bringing together computer security incident response team from government, commercial and academics is -------------
Question 3 ------------- are functional end user equipment that are used to transmit digital signals over analog telephone lines
Question 4 ----------- is not a commonly known intrusion detection system (IDS)
Question 5 Collection and protection of information associated with intrusion falls under which of the best practices for incident handling according to CERT/CC
Question 6 --------- is performed in lieu of traditional forensic duplications
Question 7 The process of writing zeros, ones, or random characters on the device from starting block of data to the end is called
Question 8 Through a honeynet, --------- captures information on the behavior, intentions, characteristics, and identity of attackers
Question 9 ---------- techniques use TCP and higher-layer control data for filtering process
Question 10 The main disadvantage in using application proxy firewalls is
Explanation / Answer
1. Teaditional Forensics is generally reactive and applied after an incident has occured
2. FIRST is a collection of CSIRTs, dringing together a variety of computer security incident response teams from government, commercial, and academic organizations.
FIRST aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large.
3. modems are functional end user equipment that are used to transmit digital signals over analog telephone lines.
4. intrusion prevention system(IPS) is not a commonly known intrusion detection system(IDS).
5. According to CERT/CC , Proactive services provide assistance and information to help prepare, protect, and secure constituent systems in anticipation of attacks, problems, or events.
6. Live acquisition is performed in lieu of traditional forensic duplications.
7. The process of writing zeros, ones, or random characters on the device from starting block of data to the end is called disk formatting.
9. Stateful inspection techniques use TCP and higher layer control data for filtering process.
10. The main disadvantage to proxy based firewalls is their cost.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.