A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions is called
A) log analysis.
B) intrusion detection systems.
C) continuous monitoring.
D) defense in depth.
Correct Answer:
Verified
Q83: COBIT 5 management practice APO01.08 stresses the
Q84: Timely detection of problems is not enough
Q85: Many corrective controls rely on human judgment.
Q86: Virtualization refers to the ability of
A)running multiple
Q87: Why does COBIT5 DSS-05.06 stress the importance
Q89: Cloud computing can potentially generate significant cost
Q90: Describe the three types of detective controls
Q91: Cloud computing is generally more secure than
Q92: Describe the differences between virtualization and cloud
Q93: The most important element of any preventive
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents