What is used to achieve this result?

An administrator wants the Host At Risk event to generate an alarm.

What is used to achieve this result?
A . A security trigger activity
B . A security filter
C . An event to alarm mapping
D . An event to action mapping

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments