Which logs would be a preferable starting point for an investigation?
Sensitive company data is found leaked on the internet, and the security team didn’t get any alert and is unsure of how the breach occurred.
Which logs would be a preferable starting point for an investigation?
A . Identity and Access Management
B . Application
C . Resource Management
D . Endpoint
Answer: A
Latest GCFR Dumps Valid Version with 82 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments