After a recent breach, the security technician decides the company needs to analyze and aggregate
its security logs. Which of the following systems should be used?
A.
Event log
B.
Syslog
C.
SIEM
D.
SNMP
After a recent breach, the security technician decides the company needs to analyze and aggregate
its security logs. Which of the following systems should be used?
After a recent breach, the security technician decides the company needs to analyze and aggregate
its security logs. Which of the following systems should be used?
A.
Event log
B.
Syslog
C.
SIEM
D.
SNMP