CompTIA CySA+ CS0-003 Practice Question
Which monitoring tactic provides the most reliable indication of potential data exfiltration by an unauthorized internal user?
Monitoring outbound traffic for large data transfers to external IP addresses
Monitoring processor and memory usage on workstations
Tracking internal network bandwidth usage
Logging and reviewing login times