Watch this video on YouTube
As a part of her security measures, Sarah wants to track and control the data that is leaving the company network to prevent unauthorized data exfiltration. What type of monitoring should she implement?