What will you do to accomplish the task?

You work as a Security Manager for Tech Perfect Inc. In the organization, Syslog is used for
computer system management and security auditing, as well as for generalized informational,
analysis, and debugging messages. You want to prevent a denial of service (DoS) for the Syslog
server and the loss of Syslog messages from other sources. What will you do to accomplish the
task?

You work as a Security Manager for Tech Perfect Inc. In the organization, Syslog is used for
computer system management and security auditing, as well as for generalized informational,
analysis, and debugging messages. You want to prevent a denial of service (DoS) for the Syslog
server and the loss of Syslog messages from other sources. What will you do to accomplish the
task?

A.
Use a different message format other than Syslog in order to accept data.

B.
Enable the storage of log entries in both traditional Syslog files and a database.

C.
Limit the number of Syslog messages or TCP connections from a specific source for a certain
time period.

D.
Encrypt rotated log files automatically using third-party or OS mechanisms.

Explanation:
In order to accomplish the task, you should limit the number of Syslog messages or
TCP connections from a specific source for a certain time period. This will prevent a denial of
D is incorrect. You can encrypt rotated log files automatically using third-party or OS mechanisms
other than Syslog in order to accept data for aggregating data from hosts that do not support
files and a database for creating a database storage for logs.



Leave a Reply 0

Your email address will not be published. Required fields are marked *