Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?
A. Network intrusion detection
B. Traffic analysis tool
C. Syslog server
D. Network sniffer
Answer: C. Syslog server
You might also like to view...
The best time to make a system repair disc is when you first set up your computer.
Answer the following statement true (T) or false (F)
Your organization needs to deploy its network so that all servers are isolated from the rest of the internal resources. In addition, Internet-facing systems must be isolated on a demilitarized zone (DMZ) from the internal network. How many firewalls should you deploy?
A. one B. two C. three D. four
COGNITIVE ASSESSMENT In a spreadsheet program, how is data organized?
A. in a notebook containing thousands of pages B. in columns and cells collectively called a notebook C. in rows and columns collectively called a worksheet D. in rows and columns collectively called a spreadsheet
Which of the following is NOT among the functions typically performed within the InfoSec department as a compliance enforcement obligation?
A. policy B. centralized authentication C. compliance/audit D. risk management