- Get link
- X
- Other Apps
CYB 205 Infrastructure Administration
Q: The large business that Jack works for has been using noncentralized logging for years. They have recently started to implement centralized logging, and as they reviewed logs, they discovered a breach that appeared to have involved a malicious insider. How can Jack detect issues like this using his organization's new centralized logging?
A: Deploy and use SIEM.
Explanation: Jack can detect issues using a security information and event management (SIEM) tool, which is designed to provide automated analysis and monitoring of logs and security events. It is an application system that provides a centralized capability to collect, assess, monitor, and analyze information pertaining to precursors, indicators, and information security events.Answer A is incorrect. Mobile device management (MDM) systems provide a variety of integrated tools that can help the organization maintain awareness of its mobile assets, track their usage, and provide management with insight and control of software, firmware, and data updates on these devices.Answer B is incorrect. A hypervisor is responsible for coordinating access to physical hardware and enforcing isolation between different virtual machines running on the same physical platform.Answer D is incorrect. A honeypot is a system that allows investigators to evaluate and analyze the attack strategies used by attackers.
- Get link
- X
- Other Apps
Comments
Post a Comment