Multiple Choice
Jonquil, a cybersecurityanalyst, has been asked to implement a system that collects information for analysis about traffic flowing through the routers and switches on her company's network. Which of the following protocols should she considerto implement this type of setup?
A) IDS
B) Resource Monitor
C) NetFlow
D) SIEM
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Match the command switch used with nmap
Q3: Morena wants to use Wireshark to analyze
Q4: A cybersecurity analyst is researching syslog for
Q5: Umberto works for an organization that has
Q6: Nichole, a cybersecurity analyst, has received an
Q7: Cyndi, a cybersecurity researcher, has been hired
Q8: Jorge is analyzing the event logs on
Q9: Match the command switch used with nmap
Q10: Match the command switch used with nmap
Q11: Match the command switch used with nmap