1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
3 years ago
9

Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive

amount of data to review. What type of tool would best assist him with this work?
A. Security information and event management (SIEM)
B. Intrusion prevention system (IPS)
C. Data loss prevention (DLP)
D. Virtual private network (VPN)
Computers and Technology
1 answer:
galina1969 [7]3 years ago
7 0

Answer:

Option(A) i.e "Security information and event management (SIEM)" is the correct answer for the given question.

Explanation:

The security information and event management (SIEM) is the product of the software and it gives the service of security.The security information and event management (SIEM) is the combination of security information management and security event management (SEM). The main advantage of Security information and event management (SIEM) provides real-time security alerts.

The Issac uses  Security information and event management (SIEM) and perform the log review for his organization. The Security information and event management review the massive amount of data and also provide better security

Following are the description why the others options are incorrect

  • Intrusion prevention system (IPS) is used for the threating purpose it checks the threats in the network flow so according to question this option is incorrect.
  • Data loss prevention (DLP) is used for the purpose of data loss so according to question this option is incorrect.
  • A virtual private network (VPN) is used to connect the network virtually so according to question this option is incorrect.
You might be interested in
How do media and networks interact? A. Networks and media work in exactly the same way. B. Media are connected to networks that
weeeeeb [17]

Media are connected to networks that make information easier to access and pass on. Would be the best answer in this case!!

4 0
3 years ago
Explain how files can be identified as entities on the magnetic surface?
Hunter-Best [27]

Answer:

Data is stored on a hard disk drive as a result of magnetism. A file or data is represented in bits on a disk, with 1 representing a magnetized entity and 0 for an unmagnetized surface.

Explanation:

A hard disk drive (HDD) is an electro-magnetic tool for storing data in computing. It is made of moving parts like a platter and read/write head for reading and writing data to the disk.

To read or write data on a disk, the platter spins at a very high speed ( 5000 RPM to 10000 RPM), and the head, at the right surface,  writes or reads a bit 1 as a magnetized surface and 0 as unmagnetized.

5 0
3 years ago
Why might you want to save a downloaded file to your computer first instead of running it immediately?
sukhopar [10]

Answer:

Explanation:

Run: Choose Run when you only need the download once. Perhaps it’s a song or video you only plan to listen to or watch once. Another scenario might be an installation program that, when run, installs software on your machine in other, permanent locations. Once installed, you probably don’t need the installer again.

Save: When you want to keep whatever it is you’ve downloaded, choose Save. You can still run it, or whatever else you’d like to do with it, but you’ll need to do that yourself. You’ll also want to decide where, on your computer, to keep the file.

<em>Save and run: Use this option when you want to do both: save the file to a location you control, and then immediately run it. </em>

<em />

8 0
3 years ago
What are the challenges of photographing at night? Why did the photographer “paint” the waterfall with the flashlight?
lianna [129]
Because he needed ligh
7 0
4 years ago
RAM IS often referred
miss Akunina [59]
3

thank me later :))))))))
7 0
3 years ago
Other questions:
  • A ____ is a prewritten formula that is built into excel.
    6·1 answer
  • True / False<br> Registers are generally optimized for capacity instead of speed.
    14·1 answer
  • For which punctuation symbol will you use the ring finger of your right hand?
    9·1 answer
  • Imagine your friend wants to apply
    5·1 answer
  • Write an app that reads an integer, then determines and displays whether the integer is odd or even. [Hint: Use the remainder op
    10·1 answer
  • What is the multiple source test
    15·1 answer
  • Why are online payment services necessary?
    10·2 answers
  • Consider a Huffman’s Algorithm that uses a variable-length encoding scheme to compress the original text: BIRTHDAY to determine
    7·1 answer
  • A friend asks you to look over the code for an adventure game and help figure out why it won’t work. Which of these options is s
    5·2 answers
  • Which of the following is an example of two-factor authentication?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!