What is the role of Apex Central in the Connected Threat Defense infrastructure?
Recommendation Scans can suggest rules for the following Protection Modules:
* Intrusion Prevention
* Integrity Monitoring
* Log Inspection
Explication: Study Guide - page (161)
Currently there are no comments in this discussion, be the first to comment!