I need help with a Computer Science question. All explanations and answers will be used to help me learn.
- Name two tools used for vulnerability and networks scanning. Write a brief description of each.
- Name two useful enterprise service logs which might be useful in an incident investigation. Provide a description of each, as well as a sound reason each is useful.
- Name two useful artifacts which could be gleamed from an Enterprise management application. Why are each of these items relevant to an investigation?
- Give two reasons why writing a report is required. Give a brief support statement for your reasons.