Incident prioritization must be based on:
Correct Answer:D
The correct order or sequence of the Computer Forensic processes is:
Correct Answer:B
Incidents are reported in order to:
Correct Answer:D
An adversary attacks the information resources to gain undue advantage is called:
Correct Answer:B
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
Correct Answer:A
A self-replicating malicious code that does not alter files but resides in active memory and duplicates itself, spreads through the infected network automatically and takes advantage of file or information transport features on the system to travel independently is called:
Correct Answer:B