Question 2 of 10

What are the most important types of logs that a SOC analyst monitors, and what kind of security information can you extract from each type?