File timestamps can be useful for all of the following except
A) Identifying files manipulated by the hacker
B) Determine how the hacker compromised the system
C) Identifying the attacker
D) Preventing similar attacks on other similar systems
Correct Answer:
Verified
Q15: Login attempts on a Unix/ Linux system
Q16: Historical login and logout attempts on a
Q17: Event criticality in Windows logs is indicated
Q18: The Unix logging facility is called
A) Syslog
B)
Q19: A common default location for Linux syslog
Q20: In Windows, operating system log messages are
Q21: In IT, BYOD stands for
A) Bring your
Q23: File timestamps are known as MAC timestamps,
Q24: During incident response, volatile data refers to
A)
Q25: Cloud storage adds complexity to the work
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents