Applications need access to small pieces of sensitive data, known as secrets, during build or runtime. An administrator wants to track who did what, where, and when
for these secrets within their GCP projects.
Which two log types provide this information? (Choose two.)