An incident responder is asked to create a disk image of a compromised Linux server. Which of the following commands should be used to do this?
A. dd
B. Isof
C. gzip
D. fdisk
E. mbr
Answer: A
An intruder gains physical access to a company’s headquarters. The intruder is able to access the company’s network via a visitor’s office. The intruder sets up an
attack device, under the visitor’s office desk, that impersonates the corporate wireless network. Users at headquarters begin to notice slow browsing speeds from
their company laptops. Which of the following attacks is MOST likely occurring?
A. Man-in-the-middle
B. Denial of service
C. Social engineering
D. ARP table poisoning
Answer: D