Ta przeglądarka nie jest już obsługiwana.
Zaktualizuj do Microsoft Edge, aby skorzystać z najnowszych funkcji, aktualizacji bezpieczeństwa i wsparcia technicznego.
SIEM and SOAR are key technologies that organizations deploy to monitor infrastructure. How do SIEM and SOAR function?
SIEM generates alerts of a potential threat. SOAR integrates SIEM and other security tools, triggers alerts, and takes remediation steps.
SIEM focuses on automation whereas SOAR requires more human intervention to complete the tasks.
SIEM and SOAR platforms can't work independently and rely on each other to monitor security events.
What is the goal of configuration management?
Effective configuration management enables organizations to accept default configurations and settings.
Configuration management implements clear screen and clear desk policies.
Configuration management ensures every device and endpoint is operating at optimal performance.
Why is distributed denial-of-service (DDoS) a threat vector associated with IT infrastructure?
A DDoS is a threat vector because it exhausts an application's resources with an overflow of internet traffic.
A DDoS attack is a malicious attempt to gain unauthorized access to sites or facilities.
A DDoS is a process of assessing and monitoring IT infrastructure to identify various threat vectors.
You must answer all questions before checking your work.
Czy ta strona była pomocna?
Potrzebujesz pomocy w tym temacie?
Chcesz spróbować użyć Ask Learn, aby wyjaśnić lub poprowadzić się przez ten temat?