What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?
A. IOS
B. DMZ
C. IDS
D. SIEM
Answer: D
Computer Science & Information Technology
You might also like to view...
There are three major factors to address when configuring a forensic workstation. Which of the following is actually not one of those factors?
a. Power b. Capacitity c. Security d. Authenticity of data
Computer Science & Information Technology
Which of the following are mutating-sequence algorithms defined in the Standard Library?
a. copy b. remove_if c. find d. Both (a) and (b).
Computer Science & Information Technology