Which three technologies should be included in a SOC security information and event management system? (Choose three.)
- proxy service
- log management
- firewall appliance
- threat intelligence
- security monitoring
- intrusion prevention
Answers Explanation & Hints: Technologies in a SOC should include the following:
Event collection, correlation, and analysis
Security monitoring
Security control
Log management
Vulnerability assessment
Vulnerability tracking
Threat intelligence
Proxy server, VPN, and IPS are security devices deployed in the network infrastructure.