A company has the following virtual networks defined in Azure:
……
The following virtual machines have been defined as well:
……
Which of the following can be used by the security department to check for any network intrusions?
A . IP Flow Verify
B . Variable Packet Capture
C . Azure Connection Monitor
D . Application Insights
Answer: B
Explanation:
https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-packet-capture-overview