What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
Correct Answer:
AE
Cert Guide by Omar Santos, Chapter 9 - Introduction to digital Forensics. "When you collect evidence, you must protect its integrity. This involves making sure that nothing is added to the evidence and that nothing is deleted or destroyed (this is known as evidence preservation)."
Refer to the exhibit.
What is shown in this PCAP file?
Correct Answer:
D
Which security monitoring data type requires the largest storage space?
Correct Answer:
D
Refer to the exhibit.
Which type of log is displayed?
Correct Answer:
A
You also see the 5-tuple in IPS events, NetFlow records, and other event data. In fact, on the exam you may need to differentiate between a firewall log versus a traditional IPS or IDS event. One of the things to remember is that traditional IDS and IPS use signatures, so an easy way to differentiate is by looking for a signature ID (SigID). If you see a signature ID, then most definitely the event is a traditional IPS or IDS event.
What is the difference between the rule-based detection when compared to behavioral detection?
Correct Answer:
D