Solved

Which of the Following Containment Techniques Permits the Device to Continue

Question 3

Multiple Choice

Which of the following containment techniques permits the device to continue functioning and redirects all network communication to a sinkhole so that evidence may continue to be gathered and malware analyzed?


A) Isolation
B) Removal
C) Reverse engineering
D) Segmentation

Correct Answer:

verifed

Verified

Related Questions