Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Configuring your router as a firewall (option B) is a basic security measure to prevent unauthorized access to your network from outside, but it does nothing to detect intrusion attempts. Firewalls typically provide protection by blocking unauthorized traffic, but they do not generate detailed logs of attempts.
Therefore, for the specific purpose of detecting intrusion attempts, the most effective method is to regularly review log files.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Swallows
1 day, 4 hours ago