Security and Compliance has identified that data is being leaked through a third-party application connected to G Suite You want to investigate using an audit log.

Security and Compliance has identified that data is being leaked through a third-party application connected to G Suite You want to investigate using an audit log.
What log should you use?
A. Admin audit log
B. SAML audit log
C. Drive usage audit log
D. OAuth Token audit log

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.