ISC Exam Questions

Logs must be secured to prevent:

Logs must be secured to prevent:

A.
Creation, modification, and destruction.

B.
Modification, deletion, and initialization.

C.
Modification, deletion, and destruction.

D.
Modification, deletion, and inspection.

Explanation:
All logs collected are used in the active and passive monitoring process. All logs are kept on archive
for a period of time. This period of time will be determined by your company policies. This allows the
use of logs for regular and annual audits if retention is longer then a year. Logs must be secured to
prevent modification, deletion, and destruction.