• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which three technologies should be included in a SOC security information and event management system? (Choose three.)

  • proxy service
  • log management
  • firewall appliance
  • threat intelligence
  • security monitoring
  • intrusion prevention
    Answers Explanation & Hints:

    Technologies in a SOC should include the following:
    Event collection, correlation, and analysis
    Security monitoring
    Security control
    Log management
    Vulnerability assessment
    Vulnerability tracking
    Threat intelligence
    Proxy server, VPN, and IPS are security devices deployed in the network infrastructure.

For more question and answers:

Click Here CA – CyberOps Associate v1.0 – Modules 1 – 2: Threat Actors and Defenders Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments