John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to prepare a dashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is coming.
Which of the following data source will he use to prepare the dashboard?
Which of the following factors determine the choice of SIEM architecture?
A type of threat intelligent that find out the information about the attacker by misleading them is known as
.
Which of the following is a default directory in a Mac OS X that stores security-related logs?