Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    41. An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up. What is the most likely cause?

    A. Proper chain of custody was not observed while collecting the logs.

    B. The security breach was a false positive.

    C. The network devices are not all synchronized.

    D. The attacker altered or erased events from the logs.

    42. Which of the following security operations is used for determining the attack surface of an organization?

    A. Running a network scan to detect network services in the corporate DMZ

    B. Reviewing the need for a security clearance for each employee

    C. Using configuration management to determine when and where to apply security patches

    D. Training employees on the security policy regarding social engineering

    < Prev.Page             CEHv9 Home             Next page>