Why should event auditing policies be used sparingly?

A. Event auditing can provide an attacker with valuable information regarding the structure of a network's security policies.
B. Event auditing can fill the Security event log and consume considerable resources.
C. Event auditing can trigger access warning messages for users.
D. Event auditing can affect the access control list security for protected objects.


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the output of the following code?

int a = 3; for (int i = 5; i > 0; i--) { a = a + i; cout << a << “ “; } int a = 3; for (int i = 5; i > 0; i--) { a = a + i; cout << a << “ “; } int a = 3; for (int i = 5; i > 0; i--) { a = a + i; cout << a << “ “; } a) 7 10 12 13 b) 7 10 12 13 13 c) 8 12 15 17 18 d) 8 12 15 17 18 18

Computer Science & Information Technology

Queries are used to retrieve information from tables and enable you to sort, search, and limit the data to just those records that you want to see

Indicate whether the statement is true or false

Computer Science & Information Technology

A user can create ________ forms that allow a user to enter more than one record at a time

Fill in the blank(s) with correct word

Computer Science & Information Technology

To display nonprinting lines to help position table borders, turn on the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology