An administrator has been tasked with correlating system logs to identify brute force attacks. Which of the following would allow for this as well as a centralized location to review system logs?
A. NIDS
B. SIEM
C. NIPS
D. DLP
An administrator has been tasked with correlating system logs to identify brute force attacks. Which of the following would allow for this as well as a centralized location to review system logs?
A. NIDS
B. SIEM
C. NIPS
D. DLP