Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?
IPS logs
DNS logs
SQL logs
SSL logs
Submit