This quiz is part of SearchSecurity.com's Integration of Networking and Security
School lesson, Using SIM for
threat monitoring. For more on this topic, visit the lesson page; for additional
learning resources, visit SearchSecurity.com's Security School
Course Catalog.
This was first published in October 2012
Security Management Strategies for the CIO