ExamGecko
Question list
Search
Search

Related questions











Question 16 - H12-711 discussion

Report
Export

Which of the following is true about the firewall log when the firewall hard drive is in place?

A.
Administrators can post content logs to view network threat detection and defense records
Answers
A.
Administrators can post content logs to view network threat detection and defense records
B.
Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs
Answers
B.
Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs
C.
Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.
Answers
C.
Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.
D.
The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.
Answers
D.
The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.
Suggested answer: D
asked 18/09/2024
Lyboth Ntsana
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first