Citrix Exam Questions

Which data sources should be captured?

The company’s security compliance policy requires that remote access is logged for auditing purposes.
Which data sources should be captured?

A.
NetScaler logs, StoreFront logs, and Citrix Director database

B.
Configuration Logging database, NetScaler logs, and Citrix Director database

C.
StoreFront logs, System Event logs, and firewall logs

D.
Configuration Logging database, firewall logs, and Application Event log