1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
4 years ago
12

A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review

to get detailed information about this compromise? Check all that apply
Computers and Technology
1 answer:
kaheart [24]4 years ago
6 0

Complete Question:

A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply.

A. Logs.

B. Full Disk Encryption (FDE).

C. Binary whitelisting software.

D. Security Information and Event Management (SIEM) system.

Answer:

A. Logs.

D. Security Information and Event Management (SIEM) system.

Explanation:

If a network security analyst received an alert about a potential malware threat on a user’s computer. In order to get a detailed information about this compromise, the analyst should review both the logs and Security Information and Event Management (SIEM) system.

In Computer science, logs can be defined as records of events triggered by a user, operating system and other software applications running on a computer. Log files are used to gather information stored on a computer such as user activities, system performance and software program.

Security Information and Event Management (SIEM) system is the process of gathering and integration of all the logs generated by a computer from various software application, service, process, or security tool.

These logs collected through the SIEM are shown in a format that is readable by the security analyst and this help in real-time detection of threats.

<em>Hence, logs and SIEM systems are important tools for network security analyst for detection of threats in real-time and event management functions.</em>

You might be interested in
Six causes of data lost
Serhud [2]
Hard drive failures

Accidental deletions

Computer viruses and malware infections



Power failures
6 0
3 years ago
What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for
kirill115 [55]

Answer:

anycast

Explanation:

Anycast -

It refers to as the routing methodology and the networking address where only one destination address has more than two pathway for the end destination , is referred to as an anycast .

In this case , the router has the capability to select the pathway to reach the destination , depending on the latency measurement , cost , distance and hops .

Hence , from the given information of the question ,

The correct answer is anycast .

8 0
3 years ago
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
storchak [24]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

3 0
3 years ago
_____ consists of computer equipment used to perform input, processing, and output activities.
goldfiish [28.3K]
<span> (keyboards, mice, scanning, computer chips)</span>
6 0
3 years ago
How can you get a fraction bar on a calculatar?
ArbitrLikvidat [17]
Convert a fraction to a decimal value using the fraction to decimal calculator by entering your fraction below. Use the “/” symbol for the fraction bar. To convert a decimal to a fraction, use our decimal to fraction calculator. Check out our fraction to percent calculator to convert fractions to a percentage.
6 0
3 years ago
Other questions:
  • A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a d
    11·1 answer
  • You receive a file named Project4.xlsx as an attachment to an email message. What do you expect the file to contain?
    8·1 answer
  • What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
    9·1 answer
  • What kind of company would hire an Information Support and Service employee?
    14·2 answers
  • A _______ object is used for storing data.
    9·2 answers
  • Please answer this a due tomorrow!!!
    5·1 answer
  • To expand the interface within CengageNOWv2, you need to click on the:_______.
    15·1 answer
  • In a _____ network, each device on the network is attached to a central router. If the router fails, then the other devices will
    13·1 answer
  • Who designed the apple i computer in 1976?
    13·1 answer
  • Which of the following terms refers to the area of the hard drive used for virtual memory?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!