Which data sources should be captured?

The company’s security compliance policy requires that remote access is logged for auditing purposes.
Which data sources should be captured?
A. NetScaler logs, StoreFront logs, and Citrix Director database
B. Configuration Logging database, NetScaler logs, and Citrix Director database
C. StoreFront logs, System Event logs, and firewall logs
D. Configuration Logging database, firewall logs, and Application Event log

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.