When planning a complex system architecture, it is important to build in mechanisms to secure log
information, facilitate audit log reduction, and event correlation. Besides synchronizing system
time across all devices through NTP, which of the following is also a common design consideration
for remote locations?
A.
Two factor authentication for all incident responders
B.
A central SYSLOG server for collecting all logs
C.
A distributed SIEM with centralized sensors
D.
A SIEM server with distributed sensors