What makes HTTPS traffic difficult to monitor?
Correct Answer:
D
Refer to the exhibit.
Which kind of attack method is depicted in this string?
Correct Answer:
A
Which piece of information is needed for attribution in an investigation?
Correct Answer:
C
Actually this is the most important thing: know who, what, how, why, etc.. attack the network.
What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
Correct Answer:
AE
Cert Guide by Omar Santos, Chapter 9 - Introduction to digital Forensics. "When you collect evidence, you must protect its integrity. This involves making sure that nothing is added to the evidence and that nothing is deleted or destroyed (this is known as evidence preservation)."
Refer to the exhibit.
What is shown in this PCAP file?
Correct Answer:
D