Which of the following is a benefit of implementing user and entity behavior analytics to help mitigate information security threats?
Device activity is centrally logged.
Changes to user credentials are monitored.
Data assets are effectively inventoried.
Attacks are identified against a baseline of activity.
Submit