Reference no: EM133518789
Questions: Answers the following questions:
1) How do you go about containing a infected machine?
2) What is the deference between false positive and false negative?
3) What is the difference between red team and blue team?
4) Name the different treat intelligence platforms?
5) What is the difference cross site scripting and cross site forgery?
6) Which event logs are available on window operating system?
7) What are the different Windom event code?
8) What are some of the different security events you have responded to?
9) What is the difference between spyware and keylogger?
10) What is difference between treat, risk and vulnerability?