When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?
What is the difference between deep packet inspection and stateful inspection?
A SOC analyst detected connections to known C&C and port scanning activity to main HR database servers from one of the HR endpoints via Cisco StealthWatch. What are the two next steps of the SOC team according to the NISTSP800-61 incident handling process? (Choose two)
Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?
While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header.
Which technology makes this behavior possible?
Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)