A security administrator suspects that data on a server has been exhilarated as a result of un-authorized
remote access. Which of the following would assist the administrator in con-firming the suspicions? (Choose
two.)
A.
Networking access control
B.
DLP alerts
C.
Log analysis
D.
File integrity monitoring
E.
Host firewall rules