Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 --------- Forensics is generally reactive and applied after an incide

ID: 3688173 • Letter: Q

Question

Question 1 --------- Forensics is generally reactive and applied after an incident has occurred                                           

Question 2    Organization associated with bringing together computer security incident response team from government, commercial and academics is -------------

                                                                               

Question 3             ------------- are functional end user equipment that are used to transmit digital signals over analog telephone lines

                                               

Question 4      ----------- is not a commonly known intrusion detection system (IDS)                                                                            

Question 5     Collection and protection of information associated with intrusion falls under which of the best practices for incident handling according to CERT/CC

                                               

Question 6 --------- is performed in lieu of traditional forensic duplications                                            

                                               

Question 7      The process of writing zeros, ones, or random characters on the device from starting block of data to the end is called

                                                                               

Question 8    Through a honeynet, --------- captures information on the behavior, intentions, characteristics, and identity of attackers

                                               

Question 9 ---------- techniques use TCP and higher-layer control data for filtering process                                

Question 10   The main disadvantage in using application proxy firewalls is

Explanation / Answer

1. Teaditional Forensics is generally reactive and applied after an incident has occured

2. FIRST is a collection of CSIRTs, dringing together a variety of computer security incident response teams from government, commercial, and academic organizations.

FIRST aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large.

3. modems are functional end user equipment that are used to transmit digital signals over analog telephone lines.

4. intrusion prevention system(IPS) is not a commonly known intrusion detection system(IDS).

5. According to CERT/CC , Proactive services provide assistance and information to help prepare, protect, and secure constituent systems in anticipation of attacks, problems, or events.

6. Live acquisition is performed in lieu of traditional forensic duplications.

7. The process of writing zeros, ones, or random characters on the device from starting block of data to the end is called disk formatting.

9. Stateful inspection techniques use TCP and higher layer control data for filtering process.

10. The main disadvantage to proxy based firewalls is their cost.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote