
Answer-first summary for fast verification
Answer: Utilize database audit logs, regularly analyzing them with an external machine learning system trained to recognize abnormal access patterns.
Option C is the most suitable for implementing an advanced anomaly detection system with minimal impact. It focuses on data access patterns by analyzing database audit logs with an external machine learning system, ensuring targeted and efficient monitoring. This approach avoids the broader, more resource-intensive methods of network traffic analysis (Option B) or application-level monitoring (Option D), and the complexity of correlating unrelated security events with an AI-powered SIEM system (Option A). By concentrating on relevant data access patterns, it minimizes performance and user experience impacts while effectively detecting anomalies.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
To enhance security by detecting insider threats or compromised accounts, an advanced anomaly detection system monitoring data access patterns is needed. Which approach integrates such a system with minimal performance and user experience impact?
A
Integrate an AI-powered security information and event management (SIEM) system that correlates data access logs with other security events for comprehensive anomaly detection.
B
Deploy a network traffic analysis tool that uses machine learning to identify unusual data access patterns indicative of a threat.
C
Utilize database audit logs, regularly analyzing them with an external machine learning system trained to recognize abnormal access patterns.
D
Implement an application-level monitoring solution that logs all data access requests and uses real-time analytics to detect anomalies.
No comments yet.