When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?
A . Administrators can announce the content log to view the detection and defense record of network threats
B . Administrators can understand the user’s security risk behavior and the cause of the alarm or blocking reason via threat logs.
C . Administrators know the user’s behavior, the keyword of the exploitation, and the effectiveness of the audit policy configuration through user activity logs.
D . Administrators can use the security policy in which traffic hits in the policy, for fault location when there is a problem.
Answer: D
Latest H12-711_V3.0-ENU Dumps Valid Version with 400 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund