1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
1 year ago
6

quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f

or her organization. one of her roles is to monitor alerts originating from the organization's intrusion detection system. the system typically generates several dozen alerts each day, and many of those alerts turn out to be false alarms after her investigation. this morning, the intrusion detection system gave an alert because the network began to receive an unusual high volume of the inbound traffic. ann received this alert and began looking into the origin of the traffic.
Computers and Technology
1 answer:
Sergio039 [100]1 year ago
8 0

At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

What is the security event?

A security event is known to be an alteration  in the day to day running of the operations of a network or an information technology service and it is one that tends to show the point that a security policy need to have been violated or a security safeguard could have failed.

Note that in the above point in the process, Ann is a person who see no reason to believe that any real security compromise or policy violation has occurred as this kind of situation does not meet the stage of been called a security incident or intrusion.

Therefore, based on the above, At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

Learn more about Security event from

brainly.com/question/27225071
#SPJ1

Ann is a security professional for a mid-sized business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, any many of those alerts turn out to be false alarms after her investigation.

This morning, the intrusion detection system alerted because that network began to recieve an unusually high volume of inbound traffic. Ann recieved this alert and began looking into the orgin of the traffic.

65. At this point in the incident response process, what term best describes what has occurred in Ann's organization?

A. Security occurrence

B. Security incident

C. Security event

D. Security intrusion

You might be interested in
Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a gu
olya-2409 [2.1K]

Answer:

He was not born into a family of skilled laborers

Explanation:

6 0
3 years ago
What is the average time a caller waits for an operator to answer?
kaheart [24]
3-4 minutes is about right is say
7 0
3 years ago
Have you ever watched Full House? Who is your favorite character and why? EXPLAIN AND ILL GIVE BRAINLIEST!
liubo4ka [24]

Answer:

havent watched it and thanks for this

Explanation:

7 0
3 years ago
Does anyone know a NC wise owl password I can use, it's an emergency!! I can't ask my school because they are closed and I need
snow_tiger [21]
The password would be Apple 123
6 0
3 years ago
Computer programs can be opened from where?
lions [1.4K]

Answer:

Desktop

Explanation:

Start button on windows:  Start allows you to access your computer programs and configure Microsoft Windows easily by accessing the Start menu.

Finder on macs:  the Finder is your gateway to all of the files, apps, and downloads on your Mac.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Variable costs are __________.<br><br> A. decreasing<br> B. increasing<br> C. static
    10·1 answer
  • Given an list of N integers, Insertion Sort will, for each element in the list starting from the second element: Compare the ele
    8·1 answer
  • The labels button is found under the
    7·2 answers
  • It is important for security practitioners to take into consideration the __________ element when devising password security pol
    15·1 answer
  • What part of a computer is the most important?
    13·2 answers
  • Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
    14·1 answer
  • Which of the following is important to consider before believing health or fitness information you find online?
    12·1 answer
  • How do i do a mutioutput on a mac
    9·1 answer
  • I was able to solve the question :))
    7·1 answer
  • In this lab, you use the flowchart and pseudocode found in the figures below to add code to a partially created C++ program. Whe
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!