After detecting unusual network traffic, a security analyst investigates and finds indicators of a malware infection. This is an example of ____________ in action.

  • Data Loss Prevention (DLP)
  • Endpoint Protection
  • Intrusion Detection System (IDS)
  • Security Information and Event Management (SIEM)
This scenario exemplifies the use of Security Information and Event Management (SIEM). SIEM solutions help detect and respond to security incidents by collecting and analyzing log data from various sources. The analyst's investigation, triggered by unusual network traffic, showcases the proactive monitoring capabilities of SIEM in identifying potential malware infections and other security threats.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *