Which monitoring tactic provides the most reliable indication of potential data exfiltration by an unauthorized internal user?
Logging and reviewing login times
Tracking internal network bandwidth usage
Monitoring outbound traffic for large data transfers to external IP addresses
Monitoring processor and memory usage on workstations