Friday, 2 March 2018

Cisco 300-210 Question Answer

When the WSA policy trace tool is used to make a request to the proxy, where is the request logged?

A. proxy logs
B. access logs
C. authentication logs
D. The request is not logged

Answer: B