Multiple Choice
Which of the following containment techniques permits the device to continue functioning and redirects all network communication to a sinkhole so that evidence may continue to be gathered and malware analyzed?
A) Isolation
B) Removal
C) Reverse engineering
D) Segmentation
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: What federal legislation protects user data in
Q2: A review of the change control process
Q4: Which of the following U.S. laws helps
Q5: What is the term for slicing a
Q6: Due to a lack of comprehensive federal
Q7: After a hard drive has been sanitized,
Q8: Which of the following companies had 3
Q9: _ are people with an interest or
Q10: Which of the following is not considered