Watch this video on YouTube
As a data security officer tasked with enhancing data discovery capabilities, which of the following methods would be considered atypical for this purpose?