CIW Exam Questions

which of the following resources should you audit the most aggressively?

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

A.
Authentication databases, including directory servers

B.
Intrusion detection systems, especially those placed on sensitive networks

C.
Log files on firewall systems

D.
Firewall settings for desktop systems