Which technology prevents end-device to end-device IP traceability?
Correct Answer:
C
What is a difference between an inline and a tap mode traffic monitoring?
Correct Answer:
D
Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?
Correct Answer:
B
What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
Correct Answer:
AE
Cert Guide by Omar Santos, Chapter 9 - Introduction to digital Forensics. "When you collect evidence, you must protect its integrity. This involves making sure that nothing is added to the evidence and that nothing is deleted or destroyed (this is known as evidence preservation)."
Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?
Correct Answer:
C