Which one of the following log analysis tools is used for analyzing the server’s log files?
Which of the following policy forbids everything with strict restrictions on all usage of the company systems and network?
Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?
You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network.
How would you answer?