✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
A cybersecurity analyst is configuring Wazuh on a Bodhi Linux system to monitor authentication attempts. The goal is to forward `/var/log/auth.log` entries to the Wazuh manager for analysis and alerting. The analyst is editing the `ossec.conf` file and must ensure that the correct configuration is placed within the `<logcollector>` section.Which of the following configuration blocks will successfully collect and forward authentication logs?