An administrator has been tasked with correlating system logs to identify brute force attacks.
Which of the following would allow for this as well as a centralized location to review system logs?
A.
NIDS
B.
SIEM
C.
NIPS
D.
DLP
Explanation:
An administrator has been tasked with correlating system logs to identify brute force attacks.
Which of the following would allow for this as well as a centralized location to review system logs?
An administrator has been tasked with correlating system logs to identify brute force attacks.
Which of the following would allow for this as well as a centralized location to review system logs?
A.
NIDS
B.
SIEM
C.
NIPS
D.
DLP
Explanation: