Exam 200-201 | Question id=6095 | Security policies and procedures |
An engineer needs to fetch logs from a proxy server and generate actual events according to the data received. Which technology should the engineer use to accomplish this task?
A. |
Firepower | |
B. |
Email Security Appliance | |
C. |
Web Security Appliance | |
D. |
Stealthwatch |