The Chief Information Officer (CISO) is concerned that certain systems administrators with privileged access may be reading other user's emails. Review of a tool's output shows the administrators have used web mail to log into other users' inboxes. Which of the following tools would show this type of output?
a) Intrusion Detection System (IDS)
b) Security Information and Event Management (SIEM)
c) Data Loss Prevention (DLP)
d) Network Packet Analyzer

Q&A Platform for Education
Platform Explore for Education