A team of network security analysts is examining network traffic to determine if sensitive data was exfiltrated. Upon further investigation, the analysts believe confidential data was compromised. Which of the following capabilities would BEST defend against this type of sensitive data exfiltration?
_Bihari_
1 year, 6 months ago_Bihari_
1 year, 6 months agodickchappy
1 year, 7 months agogeenoe
1 year, 7 months ago2Fish
2 years, 3 months agof3lix
2 years, 6 months agoamateurguy
2 years, 9 months agoanon0621
2 years, 10 months ago