To protect auditable information, which of the following MUST be configured to only allow read
access?
A.
Logging configurations
B.
Transaction log files
C.
User account configurations
D.
Access control lists (ACL)
To protect auditable information, which of the following MUST be configured to only allow read
access?
To protect auditable information, which of the following MUST be configured to only allow read
access?
A.
Logging configurations
B.
Transaction log files
C.
User account configurations
D.
Access control lists (ACL)