After receiving an alert about a suspicious login attempt, a security analyst can access their _____ to gather information about the alert.

Play It Safe: Manage Security Risks | Weekly challenge 3 Quiz |

After receiving an alert about a suspicious login attempt, a security analyst can access their _____ to gather information about the alert.

  • internal infrastructure
  • playbook
  • SIEM tool dashboard
  • network protocol analyzer (packet sniffer)

 

Leave a Comment