PrepAway - Latest Free Exam Questions & Answers

To determine how a security breach occurred on the corporate network, a security manager looks at the logs of

To determine how a security breach occurred on the corporate network, a security manager looks at the logs of various devices. Which of the following BEST facilitates the correlation and review of these logs?

A. Database server

B. Domain name server (DNS)

C. Time server

D. Proxy server

Explanation:

To accurately reconstruct the course of events, a time reference is needed and that is provided by the time server. The other choices would not assist in the correlation and review of these logs.


Leave a Reply