Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Security event logs can best be protected from tampering by which one of the fol

ID: 3908303 • Letter: S

Question

Security event logs can best be protected from tampering by which one of the following?

Storing the event logs on DVD-RW

Ensuring every user has administrative rights on their own workstations

Encrypting the contents using asymmetric key encryption

Using remote logging over simplex communications media

a.

Storing the event logs on DVD-RW

b.

Ensuring every user has administrative rights on their own workstations

c.

Encrypting the contents using asymmetric key encryption

d.

Using remote logging over simplex communications media

Explanation / Answer

Answer C: Encrypting the contents using asymmetric key encryption.

Explanation:

Encrypting the contents using asymmetric key encryption ensures that security event logs are protected from tampering.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote