Posted by: Pdfprep
Post Date: December 13, 2020
To determine how a security breach occurred on the corporate network, a security manager looks at the logs of various devices.
Which of the following BEST facilitates the correlation and review of these logs?
A . Database server
B . Domain name server (DNS)
C . Time server
D . Proxy server
Answer: C
Explanation:
To accurately reconstruct the course of events, a time reference is needed and that is provided by the time server. The other choices would not assist in the correlation and review of these logs.
Leave a Reply