Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 33 Topic 4 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 33 Topic 4 Discussion

312-49v11 Exam Topic 4 Question 33 Discussion:
Question #: 33
Topic #: 4

In a privilege-escalation investigation at a healthcare technology firm in Texas, forensic analysts review Microsoft Azure logging sources to identify who changed administrative role assignments within the organization ' s identity-management environment. Which Azure log source should they examine to obtain this information?


A.

Azure Monitor Logs


B.

Azure Activity Logs


C.

Azure AD Sign-in Logs


D.

Azure AD Audit Logs


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.