Login
Remember
Register
User rajeshsharma
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by rajeshsharma
0
votes
1
answer
What are the best practices to eliminate an insider attack?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
insider-attack
security-incident
0
votes
1
answer
How would you detect a storage-related security incident in the cloud?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
What is Advanced Persistent Threat? How to handle them?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
persistent-threat
0
votes
1
answer
How to detect whether a file has changed in the system?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
+1
vote
1
answer
What steps would you take after a cybersecurity incident occurs?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
cybersecurity
0
votes
1
answer
What is an incident trigger?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
incident-trigger
0
votes
1
answer
What is an automated incidence response?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
automated-incidence
0
votes
1
answer
What is the Difference between HIDS and NIDS?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
hids
nids
0
votes
1
answer
What is SIEM?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
siem
0
votes
1
answer
What is a security incident?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
What is port scanning? Why is it required?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
port-scanning
0
votes
1
answer
What document do you need to restore a system that has failed?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
What type of security breaches you may encounter as an incident responder?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-breaches
0
votes
1
answer
What are the roles and responsibilities of an incident responder?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
Which of the following are steps in the digital forensic process?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
digital-forensic
0
votes
1
answer
What does live forensic acquisition acknowledge?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
forensic-acquisition
0
votes
1
answer
Which of the following is primarily used to collect device logs from several different machines in a central location for monitoring and review?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
Which of the following pertains to legal evidence found in computers and digital storage media?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
Which of the following can be considered as information assets?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
It is ok if minor alterations occur in the evidence during forensic analysis.
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
“All incidents are events but an event is not necessarily an incident”.
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
Which of the following tricks the user into thinking they are on a real system but in reality is a virtual environment to collect incidents?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
0
votes
1
answer
Which of the following are useful incident analysis resources?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
security-assessment
0
votes
1
answer
Which of the following are the phases of the incident response process as defined by NIST?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
security-incident
nist
0
votes
1
answer
SSL provides direct support for role-based authorization.
asked
Mar 7, 2022
in
Web Services Security
ssl-services
0
votes
1
answer
Signing and encrypting messages are used to ensure:
asked
Mar 7, 2022
in
Web Services Security
signing
encyption
0
votes
1
answer
HTTP, FTP, SMTP are included in which layer of the Web service protocol stack?
asked
Mar 7, 2022
in
Web Services Security
http
ftp
smtp
0
votes
1
answer
Service description is handled by _____________________.
asked
Mar 7, 2022
in
Web Services Security
service-description
web-securtiy
0
votes
1
answer
Which of the following facilitates the encoding of messages in a common XML format?
asked
Mar 7, 2022
in
Web Services Security
encoding-mechanism
xml-format
0
votes
1
answer
Access control for services, resources, devices are based on the _________ of the requester.
asked
Mar 7, 2022
in
Web Services Security
web-services
web-resources
web-devices
Page:
« prev
1
...
53
54
55
56
57
58
59
60
61
62
63
...
187
next »
...