Which three of the following best describe how a SIEM should be used? (Choose three.)

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which three of the following best describe how a SIEM should be used? (Choose three.)
A . anomaly detection
B . data correlation
C . automated reporting
D . malware reverse engineering
E . sandboxing

Answer: ABC

Leave a Reply

Your email address will not be published.