ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 136 - CS0-003 discussion

Report
Export

Security analysts review logs on multiple servers on a daily basis. Which of the following implementations will give the best central visibility into the events occurring throughout the corporate environment without logging in to the servers individually?

A.
Deploy a database to aggregate the logging.
Answers
A.
Deploy a database to aggregate the logging.
B.
Configure the servers to forward logs to a SIEM-
Answers
B.
Configure the servers to forward logs to a SIEM-
C.
Share the log directory on each server to allow local access,
Answers
C.
Share the log directory on each server to allow local access,
D.
Automate the emailing of logs to the analysts.
Answers
D.
Automate the emailing of logs to the analysts.
Suggested answer: B

Explanation:

The best implementation to give the best central visibility into the events occurring throughout the corporate environment without logging in to the servers individually is B. Configure the servers to forward logs to a SIEM.

A SIEM (Security Information and Event Management) is a security solution that helps organizations detect, analyze, and respond to security threats before they disrupt business1. SIEM tools collect, aggregate, and correlate log data from various sources across an organization's network, such as applications, devices, servers, and users.SIEM tools also provide real-time alerts, dashboards, reports, and incident response capabilities to help security teams identify and mitigate cyberattacks2345.

By configuring the servers to forward logs to a SIEM, the security analysts can have a central view of potential threats and monitor security incidents across the corporate environment without logging in to the servers individually.This can save time, improve efficiency, and enhance security posture2345.

Deploying a database to aggregate the logging (A) may not provide the same level of analysis, correlation, and alerting as a SIEM tool. Sharing the log directory on each server to allow local access may not be scalable or secure for a large number of servers. Automating the emailing of logs to the analysts (D) may not be timely or effective for real-time threat detection and response. Therefore, B is the best option among the choices given.

asked 02/10/2024
Martin Ng
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first