Explain why access to active logs must be carefully controlled and explain how this can be accomplished.

What will be an ideal response?


Logs often contain private or sensitive data and thus must be protected. Access to active logs must be carefully controlled. It's very common to give read access rights only to specific users, to make sure only the correct users have access to the log files. In many cases it's not uncommon for the logging application to have only write access to the files-it's not a good idea to give root access to critical log files.
 

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. When an operator has two operands of different data types, C++ always converts them both to double before performing the operation. 2. The following pair of C++ statements will cause 3.5 to be output. double number = 7 / 2; cout << number; 3. The following statement sets sum1, sum2, and sum3 all to zero. sum1 = sum2 = sum3 = 0; 4. If the value of dollars is 5.0, the following statement will output 5.00 to the monitor: cout << fixed << showpoint << setprecision(4) << dollars << endl; 5. The following statement sets the value of total to -3. total -= 3;

Computer Science & Information Technology

In passive mode, the FTP client must listen and wait for the server connection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The user can use the shortcut key ________ to select an entire document

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the primary difference between the Replace Clip and Replace Footage commands?

What will be an ideal response?

Computer Science & Information Technology