Question 116
An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?
Question 117
What is a difference between SOAR and SIEM?
Question 118
Which security principle requires more than one person is required to perform a critical task?
Question 119
Refer to the exhibit.

Which type of log is displayed?

Which type of log is displayed?
Question 120
An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?