You are on page 1of 4

Question 1

Correct
1 points out of 1

Flag question

Question text

Which three tasks must technology perform to satisfy network security compliance
requirements? (Choose three.)
Select one or more:
Allow public access to aggregated logs

Prevent employees from accessing the internet

Store log data for a length of time that satisfies auditing requirements

Monitor, correlate, and notify events in real-time

Aggregate logs from many network sources

Question 2

Correct
1 points out of 1

Flag question

Question text

Which two requirements led to the development of SIEM? (Choose two.)


Select one or more:
To contend with the flood of alerts issued from IPSs and IDSs

To perform vulnerability scanning

To measure and prove compliance to various legislations

To simulate phishing attacks

Question 3

Correct
1 points out of 1

Flag question

Question text

How did SIEM evolve?


Select one:
From an information platform to a threat intelligence center

As a threat intelligence center only

As an information platform only

From an information platform to a fully integrated and automated center for security

and network operations

Question 4

Correct
1 points out of 1
Flag question

Question text

Which three regulatory standards and acts must businesses, hospitals, and other
organizations comply with? (Choose three.)
Select one or more:
GDPR

HIPAA

SPML

PCI

XSLT

Question 5

Correct
1 points out of 1

Flag question

Question text

Which three problems does SIEM solve? (Choose three.)


Select one or more:
The complexity of technology and the difficulty with identifying attacks
The long delay in discovering security breaches by security teams

The lack of security awareness by employees

More sophisticated and stealthy cyber attacks

The lack of implementation of authentication methods

You might also like