What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?

A. IOS
B. DMZ
C. IDS
D. SIEM

Answer: D

Computer Science & Information Technology

You might also like to view...

There are three major factors to address when configuring a forensic workstation. Which of the following is actually not one of those factors?

a. Power b. Capacitity c. Security d. Authenticity of data

Computer Science & Information Technology

Which of the following are mutating-sequence algorithms defined in the Standard Library?

a. copy b. remove_if c. find d. Both (a) and (b).

Computer Science & Information Technology