Posted by: Pdfprep
Post Date: December 16, 2020
Which three of the following best describe how a SIEM should be used? (Choose three.)
A . anomaly detection
B . data correlation
C . automated reporting
D . malware reverse engineering
E . sandboxing
Answer: ABC