When deploying the containerized version of IBM Security Verify Access, which three ways can log files be accessed on the configuration container?

When deploying the containerized version of IBM Security Verify Access, which three ways can log files be accessed on the configuration container?
A . By using SFTP.
B . By using the web services API.
C . By performing a publish operation
D . By using the command-line interface (CLI)
E . By using the snapshot generate command
F . By examining the /var/application.logs directory

Answer: BDF

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments