An organization is required to log all user internet activity. Which of the following would accomplish this requirement?

A. Configure an access list on the default gateway router. Configure the default gateway router to log all web traffic to a syslog server
B. Configure a firewall on the internal network. On the client IP address configuration, use the IP address of the firewall as the default gateway, configure the firewall to log all traffic to a syslog server
C. Configure a proxy server on the internal network and configure the proxy server to log all web traffic to a syslog server
D. Configure an access list on the core switch, configure the core switch to log all web traffic to a syslog server


Answer: C. Configure a proxy server on the internal network and configure the proxy server to log all web traffic to a syslog server

Computer Science & Information Technology

You might also like to view...

What is a sentinel value and how is it used?

What will be an ideal response?

Computer Science & Information Technology

Provide an overview of the proposed system, including costs and benefits, with an explanation of the various cost-benefit types and categories.

What will be an ideal response?

Computer Science & Information Technology

When using Track Changes, a horizontal dashed line displays in the margin beside a changed word to indicate that a change was made

Indicate whether the statement is true or false

Computer Science & Information Technology

To not accept a tracked change, the author can click the ________ button

Fill in the blank(s) with correct word

Computer Science & Information Technology