Which use case type is appropriate for VPN log sources? (Choose two.)
A. Advanced Persistent Threat (APT)
B. Insider Threat
C. Critical Data Protection
D. Securing the Cloud
Reference: https://www.ibm.com/docs/en/dsm?topic=management-threat-use-cases-by-log-source-type