1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Dashboards
Visually display info from various systems, used in security operation centers for a comprehensive overview
Splunk
Large-scale data platform that can process various data types, including security and incident response data
Automated Reports
Computer-generated report created automatically
Executive Summary
Condenses the contents of the reports, which vary in length based on network activity
Vulnerability Scan
Generates scan reports automatically. Remember to review the results to confirm if what is detected actually exists in the system
Authenticated Attacker
Insider Threat
Unauthenticated Attacker
Anyone