An administrator thinks the UNIX systems may be compromised, but a review of system log files provides no useful information. After discussing the situation with the security team, the administrator suspects that the attacker may be altering the log files and removing evidence of intrusion activity.Which of the following actions will help detect attacker attempts to further alter log files?

A. Enable verbose system logging
B. Change the permissions on the user's home directory
C. Implement remote syslog
D. Set the bash_history log file to "read only"


Answer: C. Implement remote syslog

Computer Science & Information Technology

You might also like to view...

When a task is ________ in Project 2013's Entry table, the task moves to the left, making it a higher level task in a WBS

A) categorized as a subtask B) summarized C) outdented D) indented

Computer Science & Information Technology

Built-in text boxes have predefined ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Describe a possible downside of a "free" Web-hosting service.

What will be an ideal response?

Computer Science & Information Technology

________ involves reworking code to make it clearer and easier to maintain while pre- serving its functionality.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology