Which internal source would BEST help a cybersecurity analyst identify patterns of abnormal user behavior that may indicate a potential security threat?
Network firewall logs
Endpoint detection and response (EDR) tool
Security Information and Event Management (SIEM) system
Logs from Security Information and Event Management (SIEM) systems are designed to aggregate and analyze security data from various sources, which include user activity. This makes SIEM systems effective for identifying patterns of abnormal behavior or anomalies indicative of potential security threats. While endpoint detection and response (EDR) tools are also useful, they focus more on detecting and responding to endpoint threats rather than aggregating and correlating data across multiple sources. Network firewalls and vulnerability scanners primarily serve different purposes and are less effective for identifying user behavior patterns specifically.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.