Question 6 of 70Which of the following security technologies sits inline on the network and prevents attacks based on signatures and behavioral analysis that can be configured as a data source within the SIEM?
Correct Answer: D
Question 7 of 70Analysts can effectively use the McAfee SIEM to identify threats by
Correct Answer: A
Question 8 of 70If there is no firewall at the border of the network, which of the following could be used to simulate the protection a firewall provides?
Correct Answer: B
Question 9 of 70When viewing the Policy Tree, what four columns are displayed within the Rules Display pane?
Correct Answer: A
Question 10 of 70An organization notices an increasing number of ESM concurrent connection events. To mitigate risks related to concurrent sessions which action should the organization take?