Which of the following BEST facilitates the correlation and review of these logs?

Posted by: Pdfprep Category: CISM Tags: , ,

To determine how a security breach occurred on the corporate network, a security manager looks at the logs of various devices.

Which of the following BEST facilitates the correlation and review of these logs?
A . Database server
B . Domain name server (DNS)
C . Time server
D . Proxy server

Answer: C

Explanation:

To accurately reconstruct the course of events, a time reference is needed and that is provided by the time server. The other choices would not assist in the correlation and review of these logs.

Leave a Reply

Your email address will not be published.