1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
3 years ago
9

Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive

amount of data to review. What type of tool would best assist him with this work?
A. Security information and event management (SIEM)
B. Intrusion prevention system (IPS)
C. Data loss prevention (DLP)
D. Virtual private network (VPN)
Computers and Technology
1 answer:
galina1969 [7]3 years ago
7 0

Answer:

Option(A) i.e "Security information and event management (SIEM)" is the correct answer for the given question.

Explanation:

The security information and event management (SIEM) is the product of the software and it gives the service of security.The security information and event management (SIEM) is the combination of security information management and security event management (SEM). The main advantage of Security information and event management (SIEM) provides real-time security alerts.

The Issac uses  Security information and event management (SIEM) and perform the log review for his organization. The Security information and event management review the massive amount of data and also provide better security

Following are the description why the others options are incorrect

  • Intrusion prevention system (IPS) is used for the threating purpose it checks the threats in the network flow so according to question this option is incorrect.
  • Data loss prevention (DLP) is used for the purpose of data loss so according to question this option is incorrect.
  • A virtual private network (VPN) is used to connect the network virtually so according to question this option is incorrect.
You might be interested in
____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its par
Bad White [126]
<span>Truth tables are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts.

A truth table shows all the possible combinations (outputs) that can be produced from the given inputs. They are mainly used in Boolean algebra.</span>
4 0
3 years ago
A computer game that can be purchased online and played right away has good _____ utility.
ratelena [41]
D. Time

It’s easy to access any time even after it was just purchased.

I hope this helped
6 0
3 years ago
What is transmission control protocol?
xz_007 [3.2K]

Answer:

it is a connection-oriented communications protocol that facilitates the exchange of messages between computing devices in a network.

Explanation:

3 0
3 years ago
Which of the following tasks are suitable for creating an algorithm? Choose all that apply.
Nookie1986 [14]

Answer:

All except saving time writing a computer program.

3 0
3 years ago
Discuss whether design considerations need to change for each kind of computer users. support your answer with an example.
vaieri [72.5K]
Each kind of computer users have different knowledge, needs and requirements. For example there is a difference between the computer knowledge of developers and users without <span>technical experience. Because of this, but also why they need and use computers, and what tools they need, design consideration need to change for each kind of computer users.</span>
<span>
</span>
8 0
3 years ago
Other questions:
  • The process of changing data from their original form to a format that more closely fits the research objectives of the research
    9·1 answer
  • Write two statements to read in values for birthMonth followed by birthYear, separated by a space. Write a statement to print th
    12·1 answer
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • ________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
    12·1 answer
  • When protecting a worksheet all cells are locked by default.?
    10·1 answer
  • The optional feature in a business letter is
    10·1 answer
  • _____ are independent and not associated with the marketing efforts of any particular company or brand.​
    9·1 answer
  • What are the advantages and disadvantages of fortran?
    13·1 answer
  • 4.11 lesson practice edhesive
    8·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!