When the firewall hard disk is in place, which of the following is correct description for the firewall log?
A . The administrator can advertise the content log to view the detection and defense records of network threats.
B . The administrator can use the threat log to understand the user’s security risk behavior and the reason for being alarmed or blocked.
C . The administrator knows the user’s behavior, the keywords explored, and the effectiveness of the audit policy configuration through the user activity log.
D . The administrator can learn the security policy of the traffic hit through the policy hit log, and use it for fault location when the problem occurs.
Answer: D
Latest H12-711-ENU Dumps Valid Version with 295 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund