ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 732 - N10-008 discussion

Report
Export

A firewall administrator observes log entries of traffic being allowed to a web server on port 80 and port 443. The policy for this server is to only allow traffic on port 443. The firewall administrator needs to investigate how this change occurred to prevent a reoccurrence. Which of the following should the firewall administrator do next?

A.
Consult the firewall audit logs.
Answers
A.
Consult the firewall audit logs.
B.
Change the policy to allow port 80.
Answers
B.
Change the policy to allow port 80.
C.
Remove the server object from the firewall policy.
Answers
C.
Remove the server object from the firewall policy.
D.
Check the network baseline.
Answers
D.
Check the network baseline.
Suggested answer: A

Explanation:

Firewall audit logs are records of the changes made to the firewall configuration, policies, and rules. They can help the firewall administrator to track who, when, and what changes were made to the firewall, and identify any unauthorized or erroneous modifications that could cause security issues or network outages.By consulting the firewall audit logs, the firewall administrator can investigate how the change that allowed traffic on port 80 to the web server occurred, and prevent it from happening again

asked 02/10/2024
Thomas Kringel
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first