How can logging play a role in stopping security breaches in a system?
A.
Logging is the activity of collecting system information that will be used formonitoring and auditing to enable early detection of security problems.
B.
Logging is the cataloging of performance issues to fight intruders.
C.
Logging plays a very minimal role in system security; it is used more as ahousekeeping measure than as a factor in an effective security policy.
D.
Logging is the process of identifying user errors and not security breaches.
Explanation:
Logging is the activity of collecting system information that will be used formonitoring and auditing to enable early detection of security problems.countability is tracked by recording user, system, and application activities.This recording is done through auditing functions and mechanisms within an operatingsystem or application. Audit trails contain information about operating systemactivities, application events, and user actions.
Comedy Nights With Kapil online
http://www.HwSLvGkVLH.com/HwSLvGkVLH
I have the same idea. A
I Guess A but mostly D would also be Correct.
Actually, no. Within the context of Security (CISSP) only A is correct. It’s not our job to track user error’s – it’s our job to track security issues.