GIAC Related Exams
GPPA Exam

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo.
Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)