When fulfilling this request, which of the following resources should you audit the most aggressively?

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server.

When fulfilling this request, which of the following resources should you audit the most aggressively?
A . Authentication databases, including directory servers
B . Intrusion detection systems, especially those placed on sensitive networks
C . Log files on firewall systems
D . Firewall settings for desktop systems

Answer: A

Latest 1D0-671 Dumps Valid Version with 125 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments