Which three technologies should be included in an SOC security information and event management system? (Choose three.)
- Proxy service
- User authentication
- Threat intelligence
- Security monitoring
- Intrusion prevention
- Event collection, correlation, and analysis
Explanation: Technologies in a SOC should include the following:
Event collection, correlation, and analysis
Security monitoring
Security control
Log managementVulnerability assessment
Vulnerability tracking
Threat intelligence
Proxy server, user authentication, and intrusion prevention systems (IPS) are security devices and mechanisms deployed in the network infrastructure and managed by the network operations center (NOC).
Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 1 Exam Answers
Please login or Register to submit your answer