What are two data items that an analyst can learn about a data exfiltration alarm by using Cisco Stealthwatch? (Choose two.)
A. application or protocol that is used to transfer the data
B. IP address to which data was sent
C. names of files that were transferred
D. the signature that triggered the alarm