FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

NETWORK ARCHITECTURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which one of the following tools would allow you to record actions for use in security incident detection?
A
Task Manager
B
Perfmon
C
Sysmon
D
Tracert
Explanation: 

Detailed explanation-1: -IDS’es (HIDS and NIDS) monitor server and network activity in real-time, and typically use attack signatures or baselines to identify and issue an alert when known attacks or suspicious activities occur on a server (HIDS) or on a network (NIDS).

Detailed explanation-2: -SentinelOne Endpoint Protection Platform (EPP) The SentinelOne EPP product includes NGAV prevention capabilities, as well as deep incident response analysis and threat hunting tools. The platform also offers remediation options and a network quarantine feature that can take systems offline to prevent further attacks.

Detailed explanation-3: -Incident response is the process of identifying a cyberattack, blocking it, and recovering from the damage that it caused. Incident response tools include support software and services that help identify a cyberattack and also those tools that automatically block attacks.

Detailed explanation-4: -An incident response plan is a set of tools and procedures that your security team can use to identify, eliminate, and recover from cybersecurity threats. It is designed to help your team respond quickly and uniformly against any type of external threat.

There is 1 question to complete.