As a security analyst, you are monitoring network traffic to ensure that SPII data is not being accessed by unauthorized users. What does this scenario describe?
a) Firewall configuration
b) Intrusion detection
c) Data encryption
d) Data loss prevention