Posted by: Pdfprep
Post Date: July 5, 2021
A security analyst is investigating a report from an employee in the human resources (HR) department who is having sporadic issues with Internet access.
When the security analyst pulls the UTM logs for the IP addresses in the HR group, the following activity is shown:
Which of the following actions should the security analyst take?
A . Ensure the HR employee is in the appropriate user group.
B . Allow port 8080 on the UTM for all outgoing traffic.
C . Disable the proxy settings on the HR employee’s device.
D . Edit the last line of the ACL on the UTM to: allow any any .
Answer: A
Leave a Reply