Soru 1: Which three tasks must technology perform to satisfy network security compliance requirements? (Choose three.)
Store log data for a length of time that satisfies auditing requirements
Prevent employees from accessing the internet
Aggregate logs from many network sources
Monitor, correlate, and notify events in real-time
Allow public access to aggregated logs
Soru 2: What does the term SIEM stand for?
Security Information and Event Manager
Security Information and Email Management
Security Information and Emergency Management
Security Information and Electronic Messaging
Soru 3: How did SIEM evolve?
From an information platform to a threat intelligence center
As an information platform only
As a threat intelligence center only
From an information platform to a fully integrated and automated center for security and network operations
Soru 4: Which three problems does SIEM solve? (Choose three.)
The lack of security awareness by employees
The complexity of technology and the difficulty with identifying attacks
The lack of implementation of authentication methods
The long delay in discovering security breaches by security teams
More sophisticated and stealthy cyber attacks
Soru 5: Which two requirements led to the development of SIEM? (Choose two.)
To simulate phishing attacks
To measure and prove compliance to various legislations
To contend with the flood of alerts issued from IPSs and IDSs
To perform vulnerability scanning