A company has just deployed a centralized event log storage system. Which of the following can
be used to ensure the integrity of the logs after they are collected?

A.
Write-once drives
B.
Database encryption
C.
Continuous monitoring
D.
Role-based access controls