What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?

What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?
A . Detect
B . Protect
C . Investigate
D . Audit

Answer: A

Explanation:

Reference: http://www.arrowecs.pt/ficheros/ partners/211_ShadowDataReport_1H_2016_Digital_Screen_compressed.pdf