Study the exhibit carefully. Which icon can be chosen to generate the access rules information displayed toward the bottom of the screen?
A.
Incident Vector icon
B.
Security Manager Policy Table Lookup icon
C.
ISR Device Manager Policy icon
D.
Raw Events icon