This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
SIEM and SOAR are key technologies that organizations deploy to monitor infrastructure. How do SIEM and SOAR function?
SIEM generates alerts of a potential threat. SOAR integrates SIEM and other security tools, triggers alerts, and takes remediation steps.
SIEM focuses on automation whereas SOAR requires more human intervention to complete the tasks.
SIEM and SOAR platforms can't work independently and rely on each other to monitor security events.
What is the goal of configuration management?
Effective configuration management enables organizations to accept default configurations and settings.
Configuration management implements clear screen and clear desk policies.
Configuration management ensures every device and endpoint is operating at optimal performance.
Why is distributed denial-of-service (DDoS) a threat vector associated with IT infrastructure?
A DDoS is a threat vector because it exhausts an application's resources with an overflow of internet traffic.
A DDoS attack is a malicious attempt to gain unauthorized access to sites or facilities.
A DDoS is a process of assessing and monitoring IT infrastructure to identify various threat vectors.
You must answer all questions before checking your work.
Was this page helpful?