I've got this! The dashboard tracks things like web application firewall violations, IP reputation issues, and signature-based detections. I'm confident those are the three correct answers.
Okay, let me think this through step-by-step. The question is asking about the data sources available when creating a Reporting Engine rule, so I need to focus on the different data sources that can be used in that context. I'm pretty sure the answer is B, but I'll double-check my notes just to be sure.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Mickie
4 months agoMartha
4 months agoElza
5 months agoSherita
5 months agoKate
5 months agoShenika
5 months agoMi
5 months agoTomoko
5 months agoDerick
5 months agoYolando
5 months agoZachary
6 months ago