Question 98:
A breach was caused by an insider threat in which customer PII was compromised. Following the breach, a lead security analyst is asked to determine which vulnerabilities the attacker used to access company resources. Which of the following should the analyst use to remediate the vulnerabilities?
Answer options:
A. Protocol analyzer B. Root cause analysis C. Behavioral analytics D. Data leak prevention