You are configuring logging for a security policy.
In this scenario, in which two situations would log entries be generated? (Choose two.)
You are configuring logging for a security policy.
In this scenario, in which two situations would log entries be generated? (Choose two.)
yes B,D make only sense.