When the WSA policy trace tool is used to make a request to the proxy, where is the request logged?
A . proxy logs
B . access logs
C . authentication logs
D . The request is not logged
Answer: B
When the WSA policy trace tool is used to make a request to the proxy, where is the request logged?
A . proxy logs
B . access logs
C . authentication logs
D . The request is not logged
Answer: B