Which three technologies should be included in a SOC security information and event management system? (Choose three.)
- security monitoring
- threat intelligence
- proxy service
- firewall appliance
- intrusion prevention
- log management
Explanation: Technologies in a SOC should include the following:
Event collection, correlation, and analysis
Security monitoring
Security control
Log management
Vulnerability assessment
Vulnerability tracking
Threat intelligence
Proxy server, VPN, and IPS are security devices deployed in the network infrastructure.
Exam with this question: Modules 1 - 2: Threat Actors and Defenders Group Exam
Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 1 Exam Answers
Exam with this question: CyberOps Associate Final Exam Answers
Please login or Register to submit your answer