When deploying threat detection systems in a corporate network, which of the following capabilities are most commonly associated with identifying and mitigating threats? (Choose two)
A cybersecurity analyst is investigating a suspected breach. The analysis reveals that attackers exploited a misconfigured cloud storage bucket to upload malicious scripts, which subsequently allowed them to gain unauthorized access to sensitive data. Which of the following best describes the exploitation method used in this scenario?
A cybersecurity analyst is configuring a Security Information and Event Management (SIEM) solution for an organization. Which of the following best describes a primary function of a SIEM in security operations?