Site icon Exam4Training

When deploying the containerized version of IBM Security Verify Access, which three ways can log files be accessed on the configuration container?

When deploying the containerized version of IBM Security Verify Access, which three ways can log files be accessed on the configuration container?
A . By using SFTP.
B . By using the web services API.
C . By performing a publish operation
D . By using the command-line interface (CLI)
E . By using the snapshot generate command
F . By examining the /var/application.logs directory

Answer: BDF

Exit mobile version