A company wants to enhance its threat intelligence capabilities by utilizing accessible internal sources. Which of the following would be the most useful internal source for detecting anomalies on the network?
Log data from network devices is critical for detecting anomalies because it provides real-time insights into network activities and behaviors. A CMDB offers valuable information for managing assets and configurations but is not directly linked to real-time anomaly detection. Corporate policies and procedures provide guidelines for operational standards but lack the direct data necessary for monitoring network activities. Human resources databases are beneficial for user information but do not contribute to the detection of network anomalies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What kind of log data is generated by network devices?
Open an interactive chat with Bash
Why is real-time monitoring important for detecting anomalies?
Open an interactive chat with Bash
What is a CMDB and how does it relate to security?