I feel pretty good about this one. The correct answer is definitely C - the source IP address may have been spoofed. That's a critical thing to keep in mind when trying to trace the origin of an attack.
Okay, let's think this through. The key is to identify the most important precaution an investigator should take. I'd say the source IP being spoofed is a big one, since that could throw off the whole investigation.
Hmm, I'm not totally sure about this one. I know we need to be careful about physical security and potential sniffers on the network, but I'm not 100% confident in the right answer here.
This seems like a pretty straightforward question. I'd focus on the key things to watch out for when investigating a network attack, like social engineering and spoofed IP addresses.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Mollie
3 months agoJina
3 months agoMi
4 months agoShad
4 months agoParis
4 months agoRosio
4 months agoAshton
4 months agoTroy
5 months agoMarci
5 months agoArletta
5 months agoTegan
5 months agoJulieta
5 months agoKenny
6 months ago