
Ultimate access to all questions.
As part of your organization's zero trust strategy, you use Identity-Aware Proxy (IAP) to protect multiple applications. You need to ingest logs into a Security Information and Event Management (SIEM) system to be alerted to possible intrusions.
Which logs should you ingest and analyze?
A
Data Access audit logs
B
Policy Denied audit logs
C
Cloud Identity user log events
D
Admin Activity audit logs