James has detected an intrusion in his company. What should he check first?

A. DNS logs
B. Firewall logs
C. Event Viewer
D. Performance logs


B. If there were an intrusion, the first thing you should check are the firewall logs. DNS logs in the event viewer and the performance logs will most likely not show intrusions to the company. The best place to look first is the firewall logs.

Computer Science & Information Technology

You might also like to view...

__________ external devices are suitable for communicating with electronic equipment.

A) ?Communication ? B) ?Application C) ?Machine readable ? D) ?Human readable

Computer Science & Information Technology

Primary tables represent the static lists of things that exist in a business such as customers, products, and suppliers. Related tables represent concepts or events

Indicate whether the statement is true or false

Computer Science & Information Technology

When adding a fill color to a cell, the color palette is displayed by clicking the Fill Color button

Indicate whether the statement is true or false

Computer Science & Information Technology

Microsoft Expression is a:

A) Word add-in for Web page design. B) Microsoft's Web page name. C) Web page template for Word. D) Web page design tool.

Computer Science & Information Technology