The company’s security compliance policy requires that remote access is logged for
auditing purposes. Which data sources should be captured?
A.
NetScaler logs, StoreFront logs, and Citrix Director database
B.
Configuration Logging database, NetScaler logs, and Citrix Director database
C.
StoreFront logs, System Event logs, and firewall logs
D.
Configuration Logging database, firewall logs, and Application Event log