List four type of events you should monitor as part of a security event management program.

What will be an ideal response?


Logins
Creation of user accounts and groups
Correct handling of e-mail attachments
Backups and other ways to maintain and protect sensitive information
Antivirus scanning and control
Procedures for granting secure remote access to mobile users

Computer Science & Information Technology

You might also like to view...

__________ is not a desirable characteristic of a successful migration strategy.

a) Transparency b) Scalability c) Residual dependency d) Fault tolerance

Computer Science & Information Technology

A method of communication between two electronic devices over the web is known as a(n) ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A space is a commonly used field delimiter

Indicate whether the statement is true or false.

Computer Science & Information Technology

What is NOT part of a variable declaration in the C# programming language?

A. The data type the variable will store. B. The variable's name. C. An optional assignment operator and assigned value. D. The variable's associated parent class.

Computer Science & Information Technology