After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?
A. Event log
B. Syslog
C. SIEM
D. SNMP
CompTIA exam questions
After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?
A. Event log
B. Syslog
C. SIEM
D. SNMP
What are possible symptoms of malware? (Select all that apply.)
A. Security alerts
B. Windows update failures
C. Pre-installation environment
D. Renamed system files
E. Rogue antivirus
F. User error