Scenario: A NetScaler Engineer is asked to interpret the following configuration:
add audit syslogAction syslog_srv_1 192.168.0.1 -logLevel ERROR
add audit syslogAction syslog_srv_2 192.168.0.2 -logLevel WARNING
add audit syslogAction syslog_srv_3 192.168.0.3 -logLevel CRITICAL
add audit syslogAction syslog_srv_4 192.168.0.4 -logLevel ALERT
add audit syslogPolicy audit_pol_1 ns_true syslog_srv_1
add audit syslogPolicy audit_pol_2 ns_true syslog_srv_2
add audit syslogPolicy audit_pol_3 ns_true syslog_srv_3
add audit syslogPolicy audit_pol_4 ns_true syslog_srv_4
bind system global audit_pol_1 -priority 100
bind system global audit_pol_2 -priority 100
bind system global audit_pol_3 -priority 100
bind system global audit_pol_4 -priority 100
add audit messageaction log-act1 CRITICAL ‘”Client:”+CLIENT.IP.SRC+”
accessed “+HTTP.REQ.URL’ -bypassSafetyCheck YES
add responder policy RP_pol http.REQ.IS_VALID NOOP -logAction log-act1
bind responder global RP_pol 100 END -type REQ_OVERRIDE
Which syslog server will receive log information?

A.
syslog_srv_3
B.
syslog_srv_4
C.
syslog_srv_1
D.
syslog_srv_2