A network technician is investigating reports of blocked downloads from a firewall.
Which of the following should be used to determine which protocols are being blocked?
A.
Ping B.
Log review C.
Vulnerability scans D.
Alerts.
B.
A network technician is investigating reports of blocked downloads from a firewall.
Which of the following should be used to determine which protocols are being blocked?
A.
Ping
B.
Log review
C.
Vulnerability scans
D.
Alerts.
B.
The correct answer to the question is B. Log review.
When investigating reports of blocked downloads from a firewall, it is important to determine which protocols are being blocked. One way to do this is by reviewing the firewall logs. Firewall logs contain information about the traffic that has been allowed and denied through the firewall.
By reviewing the firewall logs, the network technician can identify which protocols are being blocked and which ports are being used. This information can be used to adjust the firewall rules to allow the necessary protocols to pass through.
The other options presented in the question are not suitable for determining which protocols are being blocked. Ping (option A) is used to test network connectivity and does not provide information about which protocols are being blocked. Vulnerability scans (option C) are used to identify vulnerabilities in the network and do not provide information about which protocols are being blocked. Alerts (option D) are notifications that are triggered when certain events occur and do not provide information about which protocols are being blocked.
In summary, the best way to determine which protocols are being blocked from a firewall is to review the firewall logs.