A city government's IT director was notified by the city council that the following cybersecurity requirements must be met to be awarded a large federal grant:
• Logs for all critical devices must be retained for 365 days to enable monitoring and threat hunting.
• All privileged user access must be tightly controlled and tracked to mitigate compromised accounts.
• Ransomware threats and zero-day vulnerabilities must be quickly identified.
Which of the following technologies would BEST satisfy these requirements? (Choose three.)
Broesweelies
Highly Voted 1 year, 9 months agonuel_12
1 year agodeeden
Most Recent 2 days, 3 hours agoServerBrain
4 months, 2 weeks ago23169fd
4 months, 3 weeks agoninjachuleta
6 months, 1 week agoninjachuleta
6 months, 1 week agoSangSang
6 months agoBlingy
10 months, 1 week agoTrap_D0_r
11 months, 1 week agoAnarckii
11 months, 1 week agoOdinAtlasSteel
1 year agonuel_12
1 year agoThatGuyOverThere
1 year, 1 month ago32d799a
1 year, 1 month agoAriel235788
1 year, 2 months agoBiteSize
1 year, 4 months agoitsTopaz
1 year, 8 months agosmqzbq
1 year, 9 months agoCock
1 year, 9 months ago