exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 498 discussion

Actual exam question from CompTIA's SY0-601
Question #: 498
Topic #: 1
[All SY0-601 Questions]

A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?

  • A. Security information and event management
  • B. A web application firewall
  • C. A vulnerability scanner
  • D. A next-generation firewall
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cyberPunk28
1 year, 6 months ago
Selected Answer: A
A. Security information and event management
upvoted 2 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: A
Security information and event management (SIEM) is the technology that will accomplish the objective of centralizing logs to create a baseline and gain visibility on security events. SIEM is a comprehensive approach to security management that involves the collection, aggregation, analysis, and correlation of log data from various sources throughout an organization's IT infrastructure. It allows security teams to monitor, detect, and respond to security incidents effectively. A SIEM system can collect log data from various sources, such as firewalls, network devices, servers, applications, and endpoints, and then normalize and correlate this data to provide a centralized view of security events and activities. It can help identify suspicious or anomalous behavior, detect security incidents, and provide real-time alerts for potential threats.
upvoted 4 times
...
Gamsje
1 year, 11 months ago
Selected Answer: A
Security Information and Event Management (SIEM) is about log files. I choose A
upvoted 2 times
...
CastratedMonk
2 years ago
Selected Answer: A
A SIEM's functionality includes centralised logging and the ability to baseline a system then detect events that are anomalous to that baseline. The question didn't state anything about traffic or networks so it can't be a firewall and a vulnerability scanner has nothing to do with logs.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...