Which logs would be a preferable starting point for an investigation?

Sensitive company data is found leaked on the internet, and the security team didn’t get any alert and is unsure of how the breach occurred.

Which logs would be a preferable starting point for an investigation?
A . Identity and Access Management
B . Application
C . Resource Management
D . Endpoint

Answer: A

Latest GCFR Dumps Valid Version with 82 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments