List of questions
Related questions
Question 11 - D-SF-A-24 discussion
The security team recommends the use of User Entity and Behavior Analytics (UEBA) in order to monitor and detect unusual traffic patterns, unauthorized data access, and malicious activity of A .R.T.I.E. The monitored entities include A .R.T.I.E. processes, applications, and network devices Besides the use of UEBA, the security team suggests a customized and thorough implementation plan for the organization.
What are the key attributes that define UEBA?
A.
User analytics, threat detection, and data.
B.
User analytics, encryption, and data.
C.
Encryption, automation, and data.
D.
Automation, user analytics, and data.
Your answer:
0 comments
Sorted by
Leave a comment first