Which of the following systems should be used?

After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?

After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?

A.
Event log

B.
Syslog

C.
SIEM

D.
SNMP

Explanation:



Leave a Reply 3

Your email address will not be published. Required fields are marked *


SDG

SDG

Security Event and Incident Management

Asir Mufti

Asir Mufti

its Security Information and Event Management

Rachel

Rachel

SIEM – Security Event and Incident Management.
Software products and services that provide real-time analysis of security alerts generated by network hardware and application.