Which action would be applicable after enabling anomalous compute provisioning?
A . It detects the activity caused by the spambot.
B. It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment.
C. It detects potential creation of an unauthorized network of compute instances with AutoFocus.
D. It detects potential creation of an unauthorized network of compute instances either accidentally or for cryptojacking.
Answer: D
Latest PCCSE Dumps Valid Version with 85 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund