Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)

Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
A . Network flow
B. Audit
C. Traffic
D. Users

Answer: A,B

Latest PCCSE Dumps Valid Version with 85 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments