Exam Name: | EC-Council Information Security Manager (EISM) | ||
Exam Code: | 512-50 Dumps | ||
Vendor: | ECCouncil | Certification: | EISM |
Questions: | 404 Q&A's | Shared By: | santiago |
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?