Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
A . Network flow
B. Audit
C. Traffic
D. Users
Answer: A,B
Latest PCCSE Dumps Valid Version with 85 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund