Audit log information can BEST be protected by: (Select TWO).
A.
a firewall that creates an enclave
B.
access controls that restrict usage
C.
using a VPN
D.
recording to write-once media.
E.
an intrusion prevention system (IPS)
F.
an IDS
Audit log information can BEST be protected by: (Select TWO).
Audit log information can BEST be protected by: (Select TWO).
A.
a firewall that creates an enclave
B.
access controls that restrict usage
C.
using a VPN
D.
recording to write-once media.
E.
an intrusion prevention system (IPS)
F.
an IDS