PdfPrep.com

Which three of the following best describe how a SIEM should be used? (Choose three.)

Which three of the following best describe how a SIEM should be used? (Choose three.)
A . anomaly detection
B . data correlation
C . automated reporting
D . malware reverse engineering
E . sandboxing

Answer: ABC

Exit mobile version