Correct answer: It provides a more complete view of potential attack vectors, enabling correlation between endpoints and network behavior
Explanation:
Host-based data (processes, logs, file changes) and network-based data (traffic flows, connection attempts, anomalies) often complement each other. Combined analysis can reveal how an attacker moved from external network into host, executed malware, and exfiltrated data. This holistic approach is crucial for accurate detection, threat hunting, and response under the Security Operations domain.
Correct answer: It provides a more complete view of potential attack vectors, enabling correlation between endpoints and network behavior
Explanation:
Host-based data (processes, logs, file changes) and network-based data (traffic flows, connection attempts, anomalies) often complement each other. Combined analysis can reveal how an attacker moved from external network into host, executed malware, and exfiltrated data. This holistic approach is crucial for accurate detection, threat hunting, and response under the Security Operations domain.