A company recently migrated all its workloads to the cloud and implemented a transit VPC with a managed firewall. The cloud infrastructure implements a 10.0.0.0/16 network, and the firewall implements the following ACLs:
The Chief Information Security Officer wants to monitor relevant traffic for signs of data exfiltration. Which of the following should the organization place in its monitoring tool to BEST detect data exfiltration while reducing log size and the time to search logs?
YUYUY
Highly Voted 1 year, 3 months agoarmid
10 months agoarmid
10 months agoCraZee
1 year, 3 months agoWhip
1 year, 1 month agoPotato42
Highly Voted 1 year, 4 months agosaucehozz
1 year ago3041b53
Most Recent 3 months, 2 weeks agoEAlonso
9 months, 3 weeks agotalosDevbot
1 year, 3 months ago[Removed]
1 year, 5 months agoguwno
1 year, 4 months agobiggytech
1 year, 5 months agonuel_12
1 year, 5 months ago