I've got this! The dashboard tracks things like web application firewall violations, IP reputation issues, and signature-based detections. I'm confident those are the three correct answers.
Okay, let me think this through step-by-step. The question is asking about the data sources available when creating a Reporting Engine rule, so I need to focus on the different data sources that can be used in that context. I'm pretty sure the answer is B, but I'll double-check my notes just to be sure.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Mickie
6 months agoMartha
6 months agoElza
6 months agoSherita
6 months agoKate
7 months agoShenika
7 months agoMi
7 months agoTomoko
7 months agoDerick
7 months agoYolando
7 months agoZachary
7 months ago