A security administrator is investigating a recent server breach. The breach occurred as a result of a zero-day attack against a user program running on the server. Which of the following logs should the administrator search for information regarding the breach?
A. Application log
B. Setup log
C. Authentication log
D. System log
Answer: A. Application log
Computer Science & Information Technology
You might also like to view...
The
element is a block-level element.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Virtual private networks (VPNs) establish a secure private connection over which of the following communication mediums?
a. Intranet b. Internet c. Secure network d. Internal network
Computer Science & Information Technology
There is no difference in a residential and a commercial lease.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What technique is used by computers to determine the network ID of an IP address?
A. supernetting B. classful addressing C. subnetting D. logical AND operation
Computer Science & Information Technology