List of questions
Related questions
Question 16 - H12-711 discussion
Which of the following is true about the firewall log when the firewall hard drive is in place?
A.
Administrators can post content logs to view network threat detection and defense records
B.
Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs
C.
Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.
D.
The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.
Your answer:
0 comments
Sorted by
Leave a comment first