How do proxy server log files help protect the network?

What will be an ideal response?


Detecting intrusions-By reviewing the firewall logs in detail, you can determine whether an unauthorized user has accessed resources that should be protected.
Uncovering weaknesses-Log files can point to ports, machines, or other vulnerable computers through which hackers can gain entry. These entry points are known as holes.
Providing documentation-If intrusions occur, log files record when the attack occurred and provide indications of the method that was used.

Computer Science & Information Technology

You might also like to view...

A(n) ________ style is a style that can be applied as a character style in one place and as a paragraph style in another

A) linked B) indexed C) tabular D) list

Computer Science & Information Technology

Which IEEE standard is used to authenticate wireless clients?

A) 802.11i B) 802.3ac C) 802.2af D) 802.1X

Computer Science & Information Technology

The index positions available for access in a list range from 0 to its physical size minus 1.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Establishing a method to erase or clear memory is an example of securing which of the following?

A. Data in transit B. Data at rest C. Data in use D. Data in motion

Computer Science & Information Technology