Multiple beaconing activities to a malicious domain have been observed. The malicious domain is hosting malware from various endpoints on the network. Which of the following technologies would be BEST to correlate the activities between the different endpoints? A. Firewall B. SIEM C. IPS D. Protocol analyzer Correct Answer: B This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer