Refer to the exhibit.

A company employee is connecting to mail google.com from an endpoint device. The website is loaded but with an error. What is occurring?
A security analyst received a ticket about suspicious traffic from one of the workstations. During the investigation, the analyst discovered that the workstation was communicating with an external IP. The analyst could not investigate further and escalated the case to a T2 security analyst. What are the two data visibility challenges that the security analyst should identify? (Choose two.)
Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)
Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)