Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
Logs may contain information that is sensitive or needed for forensic purposes, so they should be configured in ways that prevent alteration or deletion as well as preventing access by authorized personnel. In particular, they should be implemented in ways that prevent administrators with responsibility for systems or applications from altering or
deleting logs made against their own scopes of responsibility. The risk practitioner should consider log access pennissions as part of evaluating the level of potential insider threat.
It's not correct. D. Acces privileged controls the confidenciality, not the integrity. A SIEM (tracking changing logs) protect the integrity of the application.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
efe6fee
18 hours, 30 minutes agoBisibaby
4 weeks, 1 day agoRadko96
2 months ago