Which three technologies should be included in a SOC security information and event management system? (Choose three.)

Which three technologies should be included in a SOC security information and event management system? (Choose three.)

  • proxy service
  • log management
  • firewall appliance
  • threat intelligence
  • security monitoring
  • intrusion prevention
    Answers Explanation & Hints:

    Technologies in a SOC should include the following:
    Event collection, correlation, and analysis
    Security monitoring
    Security control
    Log management
    Vulnerability assessment
    Vulnerability tracking
    Threat intelligence
    Proxy server, VPN, and IPS are security devices deployed in the network infrastructure.

For more question and answers:

Click Here CA – CyberOps Associate v1.0 – Modules 1 – 2: Threat Actors and Defenders Group Exam Answers Full 100%

Leave a comment