Ann, a CIRT member, is conducting incident response activities on a network that consists of several hundred virtual servers and thousands of endpoints and end users. The network generates more than 10,000 log messages per second. The enterprise belongs to a large, web-based cryptocurrency startup. Ann has disabled the relevant information into an easily digestible report for executive management. However, she still needs to collect evidence of the intrusion that caused the incident. Which of the following should Ann use to gather the required information?
- Traffic interceptor log analysis
- Log reduction and visualization tools
- Proof of work analysis
- Ledger analysis software
Ans A : And Justification
ANS A. Ann, a CIRT member, is conducting incident response activities on a network that consists of several hundred virtual servers and thousands of endpoints and end users. The network generates more than 10,000 log messages per second. The enterprise belongs to a large, web-based cryptocurrency startup. Ann has disabled the relevant information into an easily digestible report for executive management. However, she still needs to collect evidence of the intrusion that caused the incident. Which of the following should Ann use to gather the required information :-
- Traffic interceptor log analysis
Ans Option B
Log reduction and visualization tools
Based on the given information this is the correct answer
Ans : correct answer is proof of work analysis
because when Ann has distilled the relevant information into an easily digestable report for executive manager then their is a need to be any proof of that incident to be post on a network and basically several hundred virtual servers are connected and cryptocurrency startup so, proof of work analysis plays an important role here.
confused : Please suggest
Ann, a CIRT member, is conducting incident response activities on a network that consists of several hundred virtual servers and thousands of endpoints and end users. The network generates more than 10,000 log messages per second. The enterprise belongs to a large, web-based cryptocurrency startup. Ann has disabled the relevant information into an easily digestible report for executive management. However, she still needs to collect evidence of the intrusion that caused the incident. Which of the following should Ann use to gather the required information?
- Traffic interceptor log analysis
- Log reduction and visualization tools
- Proof of work analysis
- Ledger analysis software
Ans A : And Justification
ANS A. Ann, a CIRT member, is conducting incident response activities on a network that consists of several hundred virtual servers and thousands of endpoints and end users. The network generates more than 10,000 log messages per second. The enterprise belongs to a large, web-based cryptocurrency startup. Ann has disabled the relevant information into an easily digestible report for executive management. However, she still needs to collect evidence of the intrusion that caused the incident. Which of the following should Ann use to gather the required information :-
- Traffic interceptor log analysis
Ans Option B
Log reduction and visualization tools
Based on the given information this is the correct answer
Ans : correct answer is proof of work analysis
because when Ann has distilled the relevant information into an easily digestable report for executive manager then their is a need to be any proof of that incident to be post on a network and basically several hundred virtual servers are connected and cryptocurrency startup so, proof of work analysis plays an important role here.
confused : Please suggest