A company has hired a security administrator to maintain and administer Linux and Windows-based systems.
Written in the nightly report file is the following:
Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours later the size
has decreased considerably. Another hour goes by and the log files have shrunk in size again.
Which of the following actions should the security administrator take?
A.
Log the event as suspicious activity and report this behavior to the incident response team immediately.
B.
Log the event as suspicious activity, call a manager, and report this as soon as possible.
C.
Run an anti-virus scan because it is likely the system is infected by malware.
D.
Log the event as suspicious activity, continue to investigate, and act according to the site’s security policy.