1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
3 years ago
9

Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive

amount of data to review. What type of tool would best assist him with this work?
A. Security information and event management (SIEM)
B. Intrusion prevention system (IPS)
C. Data loss prevention (DLP)
D. Virtual private network (VPN)
Computers and Technology
1 answer:
galina1969 [7]3 years ago
7 0

Answer:

Option(A) i.e "Security information and event management (SIEM)" is the correct answer for the given question.

Explanation:

The security information and event management (SIEM) is the product of the software and it gives the service of security.The security information and event management (SIEM) is the combination of security information management and security event management (SEM). The main advantage of Security information and event management (SIEM) provides real-time security alerts.

The Issac uses  Security information and event management (SIEM) and perform the log review for his organization. The Security information and event management review the massive amount of data and also provide better security

Following are the description why the others options are incorrect

  • Intrusion prevention system (IPS) is used for the threating purpose it checks the threats in the network flow so according to question this option is incorrect.
  • Data loss prevention (DLP) is used for the purpose of data loss so according to question this option is incorrect.
  • A virtual private network (VPN) is used to connect the network virtually so according to question this option is incorrect.
You might be interested in
A(n) ____ is a grouping of related objects within a domain,
Anna11 [10]

Answer:

A. OU

Explanation:

An organization unit (OU) is used to group objects that are related, having similar administrative and security requirements within a domain. It provides a way of classifying objects in a directory, such as differentiating between objects with the same name or managing and creating objects. An OU can be nested into another OU, thus it can be used to create a hierarchy within an organization.

5 0
2 years ago
Which type of information could be displayed using this line graph?
ollegr [7]

Answer:

The first one I'm sorry if I'm wrong

3 0
2 years ago
Read 2 more answers
WEP (Wired Equivalent Privacy) has a design flaw which allowed attackers to break its encryption codes, WPA2 ( 2) has not suffer
ad-work [718]

Answer:

The answer is "True"

Explanation:

In computer science, the IEEE project uses this security project, it is designed for wireless network, that provides the same level security and the data encryption for cable network also.

  • It provides protects in wireless transmissions from both the poking and collecting information of packets.  
  • It also lets hackers crack their computer, that's why the given statement is true.
3 0
3 years ago
Which of theses is NOT one of the standard Text filters in Excel 2013?<br><br>​
aalyn [17]

Yes, it is possible to move a worksheet to open another workbook but not to copy it there. Explanation: Microsoft Excel is a powerful tool for organizing work or business-related things etc.

6 0
2 years ago
Does any one know how to do addition of binary numbers​
Alla [95]

Answer:

The addition of binary numbers is done by adding the digits starting from the right side of the numbers, in the same way as we add two or more base 10 numbers. In binary addition, the place values are given as ones, twos, fours, eights, sixteens, etc.

Explanation:

3 0
3 years ago
Other questions:
  • Write a MATLAB script using the quiver and contour commands to visualize the field and its divergence. Assume the region of inte
    12·1 answer
  • Which best explains what a credit score represents
    10·2 answers
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphandminutestomiles(). origi
    14·2 answers
  • Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
    13·1 answer
  • How do you delete a slide from your presentation after selecting it
    8·1 answer
  • In addition to key executives, there are other positions in a company that may be considered critical, or whose loss will be dif
    5·1 answer
  • A 5-stage MIPS pipeline has a register file without forwarding mechanism. How many NOPs (or bubbles) will you need to add to mak
    9·1 answer
  • Write a program that reads in 10 numbers and displays the number of distinct numbers and the distinct numbers in their input ord
    14·1 answer
  • Cómo fue posible que los alemanes exterminando seres humanos​
    11·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!