EXIN Exam Questions

which of the following?

Logging is critical when you want to determine whether or not your server is being attacked. You
must enable logging on your Web servers. To help prevent malicious users from deleting files to
cover their tracks, you should make sure the ACLs on the IIS-generated log files
(%systemroot%\system32\LogFiles) are set to Administrators (Full Control) and System (Full
Control). The ACL for the Everyone group should not be greater than which of the following?

A.
Full Control

B.
Modify

C.
Read & Execute

D.
List Folder

E.
Read