After detecting unusual network traffic, a security analyst investigates and finds indicators of a malware infection. This is an example of ____________ in action.
- Data Loss Prevention (DLP)
- Endpoint Protection
- Intrusion Detection System (IDS)
- Security Information and Event Management (SIEM)
This scenario exemplifies the use of Security Information and Event Management (SIEM). SIEM solutions help detect and respond to security incidents by collecting and analyzing log data from various sources. The analyst's investigation, triggered by unusual network traffic, showcases the proactive monitoring capabilities of SIEM in identifying potential malware infections and other security threats.__________________________________________________
Loading...
Related Quiz
- Which device is typically used to segment a network and control incoming and outgoing network traffic based on security policies?
- The principle that emphasizes using multiple layers of security measures to protect information and systems is called what?
- Which type of cryptography uses the same key for encryption and decryption?
- Regularly scheduled backups that only capture the data that has changed since the last full backup are known as what?
- What is the primary goal of ethical hacking?