Computer Science, asked by RosielynOria, 9 months ago

1. describe the basic features of an access control list?
2. Describe the typical contest of an entry in an event log?
3. Describe the typical steps taken to log an event?​

Answers

Answered by ItsMarmik
1

Answer:

1) An Access Control List is one filter, or a sequence of filters, that are applied to an interface to either block or pass (or when using QoS, apply priority to) packets that match the filter definitions. ACLs are used to restrict network access by hosts and devices and to control network traffic.

2) In networking, an event log is a basic resource that helps provide information about network traffic, usage and other conditions. An event log stores these data for retrieval by security professionals or automated security systems to help network administrators manage various aspects such as security, performance and transparency.

3) Logs are records of events that happen in your computer, either by a person or by a running process. They help you track what happened and troubleshoot problems.

The Windows event log contains logs from the operating system and applications such as SQL Server or Internet Information Services (IIS). The logs use a structured data format, making them easy to search and analyze. Some applications also write to log files in text format. For example, IIS Access Logs.

This article explores the Event Viewer interface and features, and introduces other major application and services logs. Examples are provided to give you a full grasp of how monitoring events can help you manage your systems for health and security.

THANK YOU

PLEASE MARK AS BRAINLIEST

Similar questions