List of questions
Related questions
Question 266 - SY0-601 discussion
Multiple beaconing activities to a malicious domain have been observed. The malicious domain is hosting malware from various endpoints on the network. Which of the following technologies would be best to correlate the activities between the different endpoints?
A.
Firewall
B.
SIEM
C.
IPS
D.
Protocol analyzer
Your answer:
0 comments
Sorted by
Leave a comment first