Which of the following questions should you take into account when securing log files? (Select the two best answers.)
A. Were the log files encrypted and hashed?
B. Are the logs stored in multiple locations?
C. Were the log files encrypted in a Kerberos system?
D. How big are the log files?
A and B. It is important to find out if log files have been encrypted and hashed, and where they are stored. Log files would not be stored in a Kerberos system. The size of log files deals more with log file maintenance than it does with security.
You might also like to view...
Which command is used on a Cisco 3750 router to begin configuration of VLAN 2?
A. VLAN2 interface B. 2 VLAN C. VLAN 2 D. interface VLAN2
Which of the following functions finds the largest value in a range?
A. MAX B. MIN C. SUM D. AVERAGE
Which of the following layers is not in the Cisco Layer 3 network structure?
a. Core b.Distribution c. Access d. Network
As data moves through a network from one program to another, it can use at most one kind of network standard.
Answer the following statement true (T) or false (F)