A city government's IT director was notified by the city council that the following cybersecurity requirements must be met to be awarded a large federal grant:
• Logs for all critical devices must be retained for 365 days to enable monitoring and threat hunting.
• All privileged user access must be tightly controlled and tracked to mitigate compromised accounts.
• Ransomware threats and zero-day vulnerabilities must be quickly identified.
Which of the following technologies would BEST satisfy these requirements? (Choose three.)
Broesweelies
Highly Voted 1 year, 10 months agonuel_12
1 year, 2 months agodeeden
Most Recent 1 month agoServerBrain
5 months, 3 weeks ago23169fd
6 months agoninjachuleta
7 months, 1 week agoninjachuleta
7 months, 1 week agoSangSang
7 months, 1 week agoBlingy
11 months, 1 week agoTrap_D0_r
1 year agoAnarckii
1 year agoOdinAtlasSteel
1 year, 1 month agonuel_12
1 year, 2 months agoThatGuyOverThere
1 year, 2 months ago32d799a
1 year, 3 months agoAriel235788
1 year, 3 months agoBiteSize
1 year, 6 months agoitsTopaz
1 year, 9 months agosmqzbq
1 year, 10 months agoCock
1 year, 10 months ago