When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?

When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?
A . Administrators can announce the content log to view the detection and defense record of network threats
B . Administrators can understand the user’s security risk behavior and the cause of the alarm or blocking reason via threat logs.
C . Administrators know the user’s behavior, the keyword of the exploitation, and the effectiveness of the audit policy configuration through user activity logs.
D . Administrators can use the security policy in which traffic hits in the policy, for fault location when there is a problem.

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments