When fulfilling this request, which of the following resources should you audit the most aggressively?
Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server.
When fulfilling this request, which of the following resources should you audit the most aggressively?
A . Authentication databases, including directory servers
B . Intrusion detection systems, especially those placed on sensitive networks
C . Log files on firewall systems
D . Firewall settings for desktop systems
Answer: A
Latest 1D0-671 Dumps Valid Version with 125 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments