7
answers
1
watching
360
views
aminul2005Lv1
3 Feb 2022
Ann, a CIRT member, is conducting incident response activities on a network that consists of several hundred virtual servers and thousands of endpoints and users. The network generates more than 10,000 log messages per second. The enterprise belong to a large, web-based cryptocurrency startup, Ann has distilled the relevant information into an easily digestible report for executive management . However, she still needs to collect evidence of the intrusion that caused the incident. Which of the following should Ann use to gather the required information?
Options:
A Traffic interceptor log analysis
B Log reduction and visualization tools
C Proof of work analysis
D Ledger analysis software
Ann, a CIRT member, is conducting incident response activities on a network that consists of several hundred virtual servers and thousands of endpoints and users. The network generates more than 10,000 log messages per second. The enterprise belong to a large, web-based cryptocurrency startup, Ann has distilled the relevant information into an easily digestible report for executive management . However, she still needs to collect evidence of the intrusion that caused the incident. Which of the following should Ann use to gather the required information?
Options:
A Traffic interceptor log analysis
B Log reduction and visualization tools
C Proof of work analysis
D Ledger analysis software
jeylam2666Lv10
3 Feb 2022
Already have an account? Log in
Read by 1 person