Question 116

An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?
  • Question 117

    What is a difference between SOAR and SIEM?
  • Question 118

    Which security principle requires more than one person is required to perform a critical task?
  • Question 119

    Refer to the exhibit.

    Which type of log is displayed?
  • Question 120

    An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?