300-210 Questions Answers
Implementing Cisco Threat Control Solutions (SITCS)
Friday, 2 March 2018
Cisco 300-210 Question Answer
When the WSA policy trace tool is used to make a request to the proxy, where is the request logged?
A.
proxy logs
B.
access logs
C.
authentication logs
D.
The request is not logged
Answer: B
Newer Posts
Older Posts
Home
Subscribe to:
Comments (Atom)