What is required for real-time surveillance of a suspect’s computer activity?
a. Poisoning data transmissions between a suspect’s computer and a network server.
b. Sniffing data transmissions between a suspect’s computer and a network server.
c. Blocking data transmissions between a suspect’s computer and a network server.
d. Preventing data transmissions between a suspect’s computer and a network server.
ANSWER: b
You might also like to view...
A form can NOT be used to delete a record from a Base database
Indicate whether the statement is true or false
Which of the following are activities conducted during the initial response portion of the incident response plan?
A. Incident declaration, internal notification, and activation of an incident response team B. Steps taken to prevent the incident from spreading C. Establishing processes and a knowledge base to accurately detect and assess precursors and indicators D. Elimination of components of the incident