CFR-310 Exam Question 36
An incident responder was asked to analyze malicious traffic. Which of the following tools would be BEST for this?
CFR-310 Exam Question 37
An incident response team is concerned with verifying the integrity of security information and event management (SIEM) events after being written to disk. Which of the following represents the BEST option for addressing this concern?
CFR-310 Exam Question 38
During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?
CFR-310 Exam Question 39
While planning a vulnerability assessment on a computer network, which of the following is essential?
(Choose two.)
(Choose two.)
CFR-310 Exam Question 40
Senior management has stated that antivirus software must be installed on all employee workstations. Which of the following does this statement BEST describe?