How do proxy server log files help protect the network?
What will be an ideal response?
Detecting intrusions-By reviewing the firewall logs in detail, you can determine whether an unauthorized user has accessed resources that should be protected.
Uncovering weaknesses-Log files can point to ports, machines, or other vulnerable computers through which hackers can gain entry. These entry points are known as holes.
Providing documentation-If intrusions occur, log files record when the attack occurred and provide indications of the method that was used.
You might also like to view...
A(n) ________ style is a style that can be applied as a character style in one place and as a paragraph style in another
A) linked B) indexed C) tabular D) list
Which IEEE standard is used to authenticate wireless clients?
A) 802.11i B) 802.3ac C) 802.2af D) 802.1X
The index positions available for access in a list range from 0 to its physical size minus 1.
Answer the following statement true (T) or false (F)
Establishing a method to erase or clear memory is an example of securing which of the following?
A. Data in transit B. Data at rest C. Data in use D. Data in motion