A security analyst who is concerned about sensitive data exfiltration reviews the following:
Which of the following tools would allow the analyst to confirm if data exfiltration is occuring?
Click on the arrows to vote for the correct answer
A. B. C. D.D.