CompTIA CySA+ CS0-003 Practice Question
Which monitoring tactic provides the most reliable indication of potential data exfiltration by an unauthorized internal user?
Tracking internal network bandwidth usage
Monitoring processor and memory usage on workstations
Logging and reviewing login times
Monitoring outbound traffic for large data transfers to external IP addresses