A city government's IT director was notified by the city council that the following cybersecurity requirements must be met to be awarded a large federal grant:
• Logs for all critical devices must be retained for 365 days to enable monitoring and threat hunting.
• All privileged user access must be tightly controlled and tracked to mitigate compromised accounts.
• Ransomware threats and zero-day vulnerabilities must be quickly identified.
Which of the following technologies would BEST satisfy these requirements? (Choose three.)
Broesweelies
Highly Voted 2 years, 3 months agonuel_12
1 year, 7 months agoninjachuleta
Highly Voted 1 year agoninjachuleta
1 year agoSangSang
1 year agochooksmagooks
Most Recent 2 months, 1 week agodeeden
6 months, 3 weeks agoServerBrain
11 months, 1 week ago23169fd
11 months, 2 weeks agoBlingy
1 year, 4 months agoTrap_D0_r
1 year, 5 months agoAnarckii
1 year, 5 months agoOdinAtlasSteel
1 year, 7 months agonuel_12
1 year, 7 months agoThatGuyOverThere
1 year, 8 months ago32d799a
1 year, 8 months agoAriel235788
1 year, 9 months agoBiteSize
1 year, 11 months agoitsTopaz
2 years, 3 months agosmqzbq
2 years, 3 months ago