Watch this video on YouTube
Sarah, a network administrator, wants to ensure that sensitive data doesn't leave the company network unauthorized. What type of monitoring should she implement?