Question 6 of 70
Which of the following security technologies sits inline on the network and prevents attacks based on signatures and behavioral analysis that can be configured as a data source within the SIEM?
Correct Answer: D

Question 7 of 70
Analysts can effectively use the McAfee SIEM to identify threats by
Correct Answer: A

Question 8 of 70
If there is no firewall at the border of the network, which of the following could be used to simulate the protection a firewall provides?
Correct Answer: B

Question 9 of 70
When viewing the Policy Tree, what four columns are displayed within the Rules Display pane?
Correct Answer: A

Question 10 of 70
An organization notices an increasing number of ESM concurrent connection events. To mitigate risks related to concurrent sessions which action should the organization take?
Correct Answer: B