When it comes to monitoring servers for security and hacking activities, which of the following can be used?
A.
Use a security auditing tool to check for hacking attempts.
B.
Examine server logs to check for any unusual entries.
C.
All of the above.
D.
None of the above.
Explanation:
You can use a security auditing tool to check for hacking attempts as part of your strategy to check for hacking activities. You should also examine server logs to check for any unusual entries.
References:
Charles J. Brooks, Server+ Certification Exam Cram 2 (Exam SK0-002), QUE Publishing, Indianapolis, 2006, pp. 458-459.