Which three technologies should be included in an SOC security information and event management system? (Choose three.)

IT Questions BankCategory: CCNA CyberOpsWhich three technologies should be included in an SOC security information and event management system? (Choose three.)

Which three technologies should be included in an SOC security information and event management system? (Choose three.)

  • Proxy service
  • User authentication
  • Threat intelligence
  • Security monitoring
  • Intrusion prevention
  • Event collection, correlation, and analysis

Explanation: Technologies in a SOC should include the following:
Event collection, correlation, and analysis
Security monitoring
Security control
Log managementVulnerability assessment
Vulnerability tracking
Threat intelligence
Proxy server, user authentication, and intrusion prevention systems (IPS) are security devices and mechanisms deployed in the network infrastructure and managed by the network operations center (NOC).

Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 1 Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments