jetth3492 jetth3492 10-06-2024 Computers and Technology Answered What could you use to inform a defensive strategy? a) Attack lifecycleb) SIEM outputc) Intrusion detection systemd) Logs