Posted by: Pdfprep
Post Date: October 30, 2020
The Chief Information Security Officer (CISO) has just returned from attending a security conference and now wants to implement a Security Operations Center (SOC) to improve and coordinate the detection of unauthorized access to the enterprise. The CISO’s biggest concern is the increased number of attacks that the current infrastructure cannot detect.
Which of the following is MOST likely to be used in a SOC to address the CISO’s concerns?
A . DLP, Analytics, SIEM, Forensics, NIPS, HIPS, WIPS and eGRC
B . Forensics, White box testing, Log correlation, HIDS, and SSO
C . Vulnerability assessments, NIDP, HIDS, SCAP, Analytics and SIEM
D . eGRC, WIPS, Federated ID, Network enumerator, NIPS and Port Scanners
Answer: A
Leave a Reply