A security analyst wants to implement new monitoring controls in order to find abnormal account activity for traveling employees. Which of the following techniques would deliver the expected results?
User behavior analysis (UBA) is the most effective method for detecting abnormal account activity.
UBA uses machine learning and behavioral analytics to identify patterns in how users interact with systems. If an employee suddenly logs in from an unusual location or accesses resources outside of their normal behavior, it raises an alert.
Option A (Malicious command interpretation) is focused on malware analysis, not user behavior.
Option B (Network monitoring) detects anomalies at the network level, but does not specifically focus on user behaviors.
Option D (SSL Inspection) is useful for decrypting encrypted traffic, but it does not analyze user activity patterns.
Felix
3 months agoBenedict
3 months agoKip
3 months agoKelvin
4 months agoValentine
4 months agoViola
4 months agoWai
4 months agoPaz
4 months agoWerner
5 months agoTerina
5 months agoOnita
5 months agoJesus
5 months agoLeatha
5 months agoHui
5 months agoJustine
5 months agoYvette
5 months agoEladia
5 months agoDerick
11 months agoLovetta
11 months agoDenny
11 months agoValentin
11 months agoJunita
11 months agoMacy
11 months agoRodolfo
11 months agoDerick
11 months agoLorita
12 months agoMartha
12 months agoLovetta
12 months agoMalika
12 months agoMa
11 months agoEna
11 months agoDoyle
11 months agoValene
11 months agoFrancis
12 months agoShenika
11 months agoRyan
11 months ago