Exam4Training

Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)

Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
A . Network flow
B. Audit
C. Traffic
D. Users

Answer: A,B

Latest PCCSE Dumps Valid Version with 85 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version