Which use case type is appropriate for VPN log sources? (Choose two.)
Which use case type is appropriate for VPN log sources? (Choose two.)
A . Advanced Persistent Threat (APT)
B . Insider Threat
C . Critical Data Protection
D . Securing the Cloud
Answer: A,B
Explanation:
Reference: https://www.ibm.com/docs/en/dsm?topic=management-threat-use-cases-by-log-source-type
Latest C1000-018 Dumps Valid Version with 60 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments