A security analyst is reviewing firewall logs and notices a large number of outbound connection attempts from an internal server to various suspicious IP addresses. This activity is unusual for this server. Which type of security control was primarily responsible for logging this activity?
-
A
Preventive
-
B
Detective
-
C
Corrective
-
D
Deterrent