A security analyst wants to implement new monitoring controls in order to find abnormal account activity for traveling employees. Which of the following techniques would deliver the expected results?
User behavior analysis (UBA) is the most effective method for detecting abnormal account activity.
UBA uses machine learning and behavioral analytics to identify patterns in how users interact with systems. If an employee suddenly logs in from an unusual location or accesses resources outside of their normal behavior, it raises an alert.
Option A (Malicious command interpretation) is focused on malware analysis, not user behavior.
Option B (Network monitoring) detects anomalies at the network level, but does not specifically focus on user behaviors.
Option D (SSL Inspection) is useful for decrypting encrypted traffic, but it does not analyze user activity patterns.
Derick
20 days agoLovetta
26 days agoDenny
28 days agoValentin
20 days agoJunita
22 days agoMacy
24 days agoRodolfo
1 months agoDerick
1 months agoLorita
1 months agoMartha
1 months agoLovetta
1 months agoMalika
1 months agoMa
19 days agoEna
20 days agoDoyle
24 days agoValene
25 days agoFrancis
1 months agoShenika
29 days agoRyan
1 months ago