which is the weakest?

Jean is an internal auditor who consistently uses the audit logs of variousnetwork systems to produce reports. an e-mail to the VP of IT, she stresses howimportant it is that proper protection controls are put in place to protect theaudit logs. Of the justifications listed below, which is the weakest?

Jean is an internal auditor who consistently uses the audit logs of variousnetwork systems to produce reports. an e-mail to the VP of IT, she stresses howimportant it is that proper protection controls are put in place to protect theaudit logs. Of the justifications listed below, which is the weakest?

A.
Unprotected audit logs can be easy altered by an intruder after committing a crime.

B.
Unapproved changes to audit logs hurt the consistency and efficiency ofautomating reporting.

C.
Audit logs often contain sensitive information and must be protected.

D.
In the event of an investigation, an unprotected audit log may be deemed inadmissible in court.

Explanation:
Unapproved changes to the audit logs, which can negatively affect the automationprocess of reporting, are not the main concern of security and the reason to protectaudit logs. Audit logs are protected to ensure the integrity and confidentiality ofthe logs.dit logs are protected to ensure the integrity and confidentiality of the logs.Only certain individuals (the administrator and security personnel) should be ableto view, modify, and delete audit trail information. No other individuals should beable to view, modify or delete audit log data.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


seenagape

seenagape

I agree with the answer. B