When the firewall hard disk is in place, which of the following is correct description for the firewall log?

When the firewall hard disk is in place, which of the following is correct description for the firewall log?
A . The administrator can advertise the content log to view the detection and defense records of network threats.
B . The administrator can use the threat log to understand the user’s security risk behavior and the reason for being alarmed or blocked.
C . The administrator knows the user’s behavior, the keywords explored, and the effectiveness of the audit policy configuration through the user activity log.
D . The administrator can learn the security policy of the traffic hit through the policy hit log, and use it for fault location when the problem occurs.

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments