A security administrator has noticed unusual activity occurring between different global instances and workloads and needs to identify the source of the unusual traffic.
Which of the following log sources would be BEST to show the source of the unusual traffic?
A . HIDS
B . UEBA
C . CASB
D . VPC
Answer: C
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund