ECCouncil 312-49v11 Question Answer
A cybersecurity analyst is tasked with investigating a series of network anomalies. They employ various event correlation approaches, including graph-based analysis to map system dependencies and neural network-based anomaly detection. Through rule-based correlation and vulnerability-based mapping, they pinpoint potential threats and prioritize response actions effectively.
Which event correlation approach involves constructing a graph with system components as nodes and their dependencies as edges?
ECCouncil 312-49v11 Summary
- Vendor: ECCouncil
- Product: 312-49v11
- Update on: Mar 30, 2026
- Questions: 300

