Which three of the following best describe how a SIEM should be used? (Choose three.)
A . anomaly detection
B . data correlation
C . automated reporting
D . malware reverse engineering
E . sandboxing
Answer: ABC
Which three of the following best describe how a SIEM should be used? (Choose three.)
A . anomaly detection
B . data correlation
C . automated reporting
D . malware reverse engineering
E . sandboxing
Answer: ABC