An administrator must configure a NetScaler system to be compliant with security policies that
require the Security Team to have the ability to provide the identity of all the connected users.
Which action could the administrator take to meet this requirement?
A.
Configure SNMP.
B.
Generate a Trace file.
C.
Configure an audit policy.
D.
Generate a Custom Report.