C. Collect and correlate IT infrastructure event logs.
Collecting and correlating IT infrastructure event logs is the most reliable way to ensure that network security incidents are identified as soon as possible. Event logs are records of activity on a system or network, and they can provide valuable information about security incidents. By collecting and analyzing event logs from different systems and devices, organizations can identify patterns of activity that may indicate a security incident. Correlating event logs can help organizations quickly identify the root cause of an incident, as well as its scope and potential impact. This can help organizations quickly respond to security incidents, minimizing the damage they cause. While other options such as installing firewalls or training employees can help improve security, they do not provide the same level of real-time visibility into network activity and potential incidents.
upvoted 4 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
richck102
1 month, 1 week agoBroesweelies
5 months, 3 weeks ago