After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?
A.
Event log
B.
Syslog
C.
SIEM
D.
SNMP
Explanation:
After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?
After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?
A.
Event log
B.
Syslog
C.
SIEM
D.
SNMP
Explanation:
Security Event and Incident Management
its Security Information and Event Management
SIEM – Security Event and Incident Management.
Software products and services that provide real-time analysis of security alerts generated by network hardware and application.