Which of the following can be used to discover if a security attack is occurring on a web server?
A.
Creating a new baseline
B.
Disable unused accounts
C.
Implementing full disk encryption
D.
Monitoring access logs
Which of the following can be used to discover if a security attack is occurring on a web server?
Which of the following can be used to discover if a security attack is occurring on a web server?
A.
Creating a new baseline
B.
Disable unused accounts
C.
Implementing full disk encryption
D.
Monitoring access logs