List of questions
Related questions
Question 244 - CAS-004 discussion
city government's IT director was notified by the City council that the following cybersecurity requirements must be met to be awarded a large federal grant:
+ Logs for all critical devices must be retained for 365 days to enable monitoring and threat hunting.
+ All privileged user access must be tightly controlled and tracked to mitigate compromised accounts.
+ Ransomware threats and zero-day vulnerabilities must be quickly identified.
Which of the following technologies would BEST satisfy these requirements? (Select THREE).
A.
Endpoint protection
B.
Log aggregator
C.
Zero trust network access
D.
PAM
E.
Cloud sandbox
F.
SIEM
G.
NGFW
Your answer:
0 comments
Sorted by
Leave a comment first