Sensitive company data is found leaked on the internet, and the security team didn’t get any alert and is unsure of how the breach occurred.
Which logs would be a preferable starting point for an investigation?
A . Identity and Access Management
B . Application
C . Resource Management
D . Endpoint
Answer: A
Latest GCFR Dumps Valid Version with 82 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund