1.
Which option in the Rules Monitors list allows for follow-up actions that are required to resolve the incident?
2.
Which source is used by Symantec Security Information Manager to create incidents?
3.
What is the correct Symantec Security Information Manager incident identification pipeline?
4.
What is the purpose of normalization?
5.
What is the unique identifier that normalization provides for each type of event?
6.
When an event is received by the Symantec Security Information Manager (SSIM), the Event Logger component inserts events into the archive without doing other processing. This is the installed on the SSIM, how can the inserted events be processed?
7.
What information does the Correlation Manager use to identify and prioritize incidents?
8.
What does the Correlation Manager component of Symantec Security Information Manager perform in real- time?
9.
What can the Correlation Manager identify in network based events?
10.
If a filtering rule is matched, the event is discarded from what component?