A city government's IT director was notified by the city council that the following cybersecurity requirements must be met to be awarded a large federal grant:
• Logs for all critical devices must be retained for 365 days to enable monitoring and threat hunting.
• All privileged user access must be tightly controlled and tracked to mitigate compromised accounts.
• Ransomware threats and zero-day vulnerabilities must be quickly identified.
Which of the following technologies would BEST satisfy these requirements? (Choose three.)
Broesweelies
Highly Voted 2 years, 2 months agonuel_12
1 year, 5 months agochooksmagooks
Most Recent 2 weeks, 2 days agodeeden
5 months agoServerBrain
9 months, 2 weeks ago23169fd
9 months, 3 weeks agoninjachuleta
11 months agoninjachuleta
11 months agoSangSang
11 months agoBlingy
1 year, 3 months agoTrap_D0_r
1 year, 4 months agoAnarckii
1 year, 4 months agoOdinAtlasSteel
1 year, 5 months agonuel_12
1 year, 5 months agoThatGuyOverThere
1 year, 6 months ago32d799a
1 year, 6 months agoAriel235788
1 year, 7 months agoBiteSize
1 year, 9 months agoitsTopaz
2 years, 1 month agosmqzbq
2 years, 1 month ago