A cybersecurity analyst is configuring a Security Information and Event Management (SIEM) solution for an organization. Which of the following best describes a primary function of a SIEM in security operations?
When deploying threat detection systems in a corporate network, which of the following capabilities are most commonly associated with identifying and mitigating threats? (Choose two)