1.
What is the term for an operation that purges redundant data while maintaining data integrity?
2.
Which evidence is always considered the best evidence?
3.
Which of the following offers incident handling services for a fee to other organizations?
4.
After compromising a host and escalating privileges, the attacker installs a remote access Trojan (RAT). What step of the Cyber Kill Chain framework has just occurred?
5.
Which of the following represents the software that is acting on behalf of a user?
6.
According to SP 800-86, which of the following is NOT an important factor when prioritizing potential data sources if evidence?
7.
Which statement is true with regard to evidence collection?
8.
Which of the following is NOT reconnaissance?
9.
In which stage of incident handling is the extent of the incident determined?
10.
Which of the following is NOT one of the 5 tuple?