A network technician needs to correlate security events to analyze a suspected intrusion
Which of the following should the technician use?
A . SNMP
B . Log review
C . Vulnerability scanning
D . SIEM
Answer: D
A network technician needs to correlate security events to analyze a suspected intrusion
Which of the following should the technician use?
A . SNMP
B . Log review
C . Vulnerability scanning
D . SIEM
Answer: D