Question 35:
Applications often require access to "secrets" - small pieces of sensitive data at build or run time. The administrator managing these secrets on GCP wants to keep a track of "who did what, where, and when?" within their GCP projects. Which two log streams would provide the information that the administrator is looking for? (Choose two.)
Answer options:
A. Admin Activity logs B. System Event logs C. Data Access logs D. VPC Flow logs E. Agent logs