Which of the following can be used to ensure the integrity of the logs after they are collected?

A company has just deployed a centralized event log storage system. Which of the following can
be used to ensure the integrity of the logs after they are collected?

A company has just deployed a centralized event log storage system. Which of the following can
be used to ensure the integrity of the logs after they are collected?

A.
Write-once drives

B.
Database encryption

C.
Continuous monitoring

D.
Role-based access controls



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three + one =