ExamGecko
Question list
Search
Search

List of questions

Search

Question 141 - PCCSE discussion

Report
Export

Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)

A.
Network flow
Answers
A.
Network flow
B.
Audit
Answers
B.
Audit
C.
Traffic
Answers
C.
Traffic
D.
Users
Answers
D.
Users
Suggested answer: A, B

Explanation:

Anomaly policies in Prisma Cloud utilize Network flow logs (A) and Audit logs (B) to identify unusual network and user activities. Network flow logs provide visibility into the traffic flow across the network, helping detect anomalies in communication patterns that might indicate malicious activities or network misconfigurations. Audit logs record user actions within the system, offering insights into potentially unauthorized or suspicious operations that could compromise security. By analyzing these logs, anomaly policies can effectively pinpoint irregularities that deviate from established baselines, enabling timely detection and response to potential security threats.

asked 23/09/2024
edoardo peraino
26 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first