Scenario: A Citrix Engineer arrives to the office to find that all access to a protected web application has stopped. The engineer reviews the Citrix ADC and verifies that the Citrix Web App Firewall feature is enabled, policies are bound, and the correct profiles are assigned to them.
Which two topics can the engineer search for in the log ties? (Choose two.)