Your organization has made a particularly unpopular policy decision. Your supervisor fears that a
series of attacks may occur as a result. You have been assigned to increase automated auditing
on a server. When fulfilling this request, which of the following resources should you audit the
most aggressively?
A.
Authentication databases, including directory servers
B.
Intrusion detection systems, especially those placed on sensitive networks
C.
Log files on firewall systems
D.
Firewall settings for desktop systems