GCFA Exam Question 186

Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen. Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.
Which of the following steps of the incident handling process is being performed by Adam?
  • GCFA Exam Question 187

    Which of the following is used for remote file access by UNIX/Linux systems?
  • GCFA Exam Question 188

    Which of the following file systems provides integrated security?
  • GCFA Exam Question 189

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He traceroutes the We-are-secure server and gets the following result:

    Considering the above traceroute result, which of the following statements can be true?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCFA Exam Question 190

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e-mail:

    The e-mail that John has received is an example of __________.