- All Exams Instant Download
Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
A . Network flow
B. Audit
C. Traffic
D. Users
Answer: A,B
Latest PCCSE Dumps Valid Version with 85 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments