A security administrator is investigating a recent server breach. The breach occurred as a result of a zero-day attack against a user program running on the server. Which of the following logs should the administrator search for information regarding the breach?

A. Application log
B. Setup log
C. Authentication log
D. System log


Answer: A. Application log

Computer Science & Information Technology

You might also like to view...

The

element is a block-level element.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Virtual private networks (VPNs) establish a secure private connection over which of the following communication mediums?

a. Intranet b. Internet c. Secure network d. Internal network

Computer Science & Information Technology

There is no difference in a residential and a commercial lease.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What technique is used by computers to determine the network ID of an IP address?

A. supernetting B. classful addressing C. subnetting D. logical AND operation

Computer Science & Information Technology