crowntinyy4918 crowntinyy4918 10-03-2024 Computers and Technology contestada Firewalls, perimeter monitoring systems, bot protection and intrusion detection are all examples of log sources for which log management use case?A. IT SecurityB. IT OperationsC. IT ComplianceD. IT Performance