Site icon Study Fy

Incident Response evident discussion

Incident Response evident discussion

Question Description

  • Name two tools used for vulnerability and networks scanning. Write a brief description of each.
  • Name two useful enterprise service logs which might be useful in an incident investigation. Provide a description of each, as well as a sound reason each is useful.
  • Name two useful artifacts which could be gleamed from an Enterprise management application. Why are each of these items relevant to an investigation?
  • Give two reasons why writing a report is required. Give a brief support statement for your reasons.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Exit mobile version