Okay, let's see here. The exhibit shows the user group details and VDA machine workloads. I think I need to analyze that information to figure out the right scaling for User Group 1.
This question feels similar to one we did in practice about access lists and logging. I think I remember that just removing log-input should stop those messages.
I'm feeling pretty confident about this one. Option B seems to hit all the requirements - it checks the destination public network and the bytes transferred. I'm going to go with that.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Noelia
4 months agoDaniela
4 months agoDeandrea
4 months agoFidelia
4 months agoNieves
5 months agoElvera
5 months agoNieves
5 months agoEdelmira
5 months ago