Who should NOT have access to the log files?
Who should NOT have access to the log files?
Which of the following correctly describe the use of the collected logs?
Which of the following correctly describe the use of the collected logs?
What determines this period of time?
All logs are kept on archive for a period of time. What determines this period of time?
Logs must be secured to prevent:
Logs must be secured to prevent:
To ensure dependable and secure logging, all computers must have their clock synchronized to:
To ensure dependable and secure logging, all computers must have their clock synchronized to:
To ensure dependable and secure logging, logging information traveling on the network should be:
To ensure dependable and secure logging, logging information traveling on the network should be:
The activity that consists of collecting information that will be used for monitoring is called:
The activity that consists of collecting information that will be used for monitoring is called:
How often should logging be run?
How often should logging be run?
Which of the following are security events on Unix that should be logged?
Which of the following are security events on Unix that should be logged?
Which of the following are potential firewall problems that should be logged?
Which of the following are potential firewall problems that should be logged?