Answer:
The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:
1. Arachni
2. Grabber
3. Iron wasp
4. Nogotofail
5. SonarQube
6. SQLMap
7. W3af
8. Wapiti
9. Wfuzz
10. ZedAttack Proxy Zap
Explanation:
The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.
The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.
 
        
             
        
        
        
Storage Media such as usb flash drives, internal and external hard drives and even back-up tapes
        
             
        
        
        
Step 1. Click the address bar at the top of your Google Chrome window, type "About: cache" into the box and press "Enter." A page will appear with a list of cached files and their addresses.
Step 2. Press the "Ctrl" and "F" keys on your keyboard at the same time to open the find bar.
Step 3. Type part of the name or address of a cached file into the find box and press "Enter" to find it. Continue pressing "Enter" to page through any matching results.
Step 4. Select the full address of the cached file on the page with your mouse and press "Ctrl" and "C" at the same time to copy the address.
Step 5. Click the address bar, press "Ctrl" and "V" at the same time to paste the address and press "Enter" to load the file. Chrome loads the file from the cache.
Step 6. Right-click the image, page or script and select "Save As" to save the cached file to your computer.
 
        
             
        
        
        
Explanation:
software must be used by well trained staff.
 
        
             
        
        
        
Answer:
The correct answer to the following question will be "Physical Layer".
Explanation:
- The lowest layer of the OSI reference model is the physical layer. It's in charge of having to send bits from one desktop to the next.
- This layer isn't acquainted with the interpretation of the parts and is concerned with setting up a physical wireless connection and sending and receiving signals.
- This layer relies on aspects of the hardware, such as wires, transmitters, and network interface tokens.
Therefore, it will be the right answer.