A company recently migrated all its workloads to the cloud and implemented a transit VPC with a managed firewall. The cloud infrastructure implements a 10.0.0.0/16 network, and the firewall implements the following ACLs:
The Chief Information Security Officer wants to monitor relevant traffic for signs of data exfiltration. Which of the following should the organization place in its monitoring tool to BEST detect data exfiltration while reducing log size and the time to search logs?
YUYUY
Highly Voted 1 year, 4 months agoarmid
11 months, 3 weeks agoarmid
11 months, 3 weeks agoCraZee
1 year, 4 months agoWhip
1 year, 3 months agoPotato42
Highly Voted 1 year, 6 months agosaucehozz
1 year, 2 months ago3041b53
Most Recent 5 months, 1 week agoEAlonso
11 months, 2 weeks agotalosDevbot
1 year, 5 months ago[Removed]
1 year, 7 months agoguwno
1 year, 6 months agobiggytech
1 year, 7 months agonuel_12
1 year, 7 months ago