After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?

A. Event log
B. Syslog
C. SIEM
D. SNMP


Answer: C. SIEM

Computer Science & Information Technology

You might also like to view...

Suppose a business with annual sales revenue of $30 million wishes to use an ERP solution.  Which ERP vendor will have the most appropriate solution for them??

A. Tier I vendors such as SAP or Oracle. B. Tier II vendors such as Epicor or Lawson. C. Tier III vendors such as Abas or Bluebee software. D. Vendors from all three tiers would be appropriate.

Computer Science & Information Technology

The _______ OSI model layer provides best path selection through the network and the Internet

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following memory module types typically features memory with CL7 or CL9 timing?

a. SDRAM b. DDR c. DDR3 d. DDR2

Computer Science & Information Technology

A(n) ____________ sensor gauges angular velocity-the change in rotational angle.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology