Incident Response evident discussion
Question Description
- Name two tools used for vulnerability and networks scanning. Write a brief description of each.
- Name two useful enterprise service logs which might be useful in an incident investigation. Provide a description of each, as well as a sound reason each is useful.
- Name two useful artifacts which could be gleamed from an Enterprise management application. Why are each of these items relevant to an investigation?
- Give two reasons why writing a report is required. Give a brief support statement for your reasons.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."