Click the exhibit button. After reviewing captured network traffic logs, a security auditor suspects a violation of the organization's computer use policy. Which of the following is the likely indicator of the violation?
Limited Time Offer
25%
Off
Blondell
4 hours agoBelen
2 days agoGianna
4 days ago