When planning a complex system architecture, it is important to build in mechanisms to secure log information, facilitate audit log reduction, and event correlation.
Besides synchronizing system time across all devices through NTP, which of the following is also a common design consideration for remote locations?
A . Two factor authentication for all incident responders
B . A central SYSLOG server for collecting all logs
C . A distributed SIEM with centralized sensors
D . A SIEM server with distributed sensors
Answer: D