A company must implement management controls to deter system administrators from making unauthorized changes to sensitive systems. Which of the following
should the company implement?

A.
System and data file hashing.
B.
Periodic reviews of system activity.
C.
Host based intrusion detection system.
D.
Remote syslog server inaccessible by system administrators.
How does preventing access to a syslog server deter unauthorized changes? That server contains syslogs of other servers. I think its option B.
0
0
What devices should I set up the syslog server on? Here is a list of devices I see the option on:
-Managed switches
-VMware ESXi hosts
-Cisco routers
-Firewalls
-AP’s
0
0
-Managed switches
-VMware ESXi hosts
-Cisco routers
-Firewalls
-AP’s…………. are these not under technical control?. While the question is on Management control.
0
0
Strong question. I don’t know answer,but I will go with D.
How syslog server can deter administrator.
0
0