Question: You are part of of an incident response team at your company. While sifting through log files collected by a SIEM, you discover some suspicious log entries that you want to investigate further. Which type of the following best refers to those recorded activities demanding additional scrutiny?

  1. attack
  2. information
  3. threat
  4. event

Answer: The correct answer of the above question is Option D:event