Question
Logs, SIEM systems, and configuration management systems are all good sources of information to validate scan results.
Group of answer choices
True
False
Group of answer choices
True
False
Answers
GPT-4o mini
True
Logs, SIEM (Security Information and Event Management) systems, and configuration management systems can all provide valuable information that helps validate the results of scans, such as vulnerability scans or security assessments. These sources can confirm whether vulnerabilities are present, provide context about system configurations, and track changes over time.
Logs, SIEM (Security Information and Event Management) systems, and configuration management systems can all provide valuable information that helps validate the results of scans, such as vulnerability scans or security assessments. These sources can confirm whether vulnerabilities are present, provide context about system configurations, and track changes over time.