Which configuration is essential for a reverse proxy instance in IBM Security Verify Access to enhance security?

Which configuration is essential for a reverse proxy instance in IBM Security Verify Access to enhance security?
A . Implementing strict URL based filtering
B . Forwarding all requests to the default server
C . Logging only error responses
D . Enabling animations on error pages

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments