Excessive activity in system logs is the best indication of a potential threat because it may signal unusual or unauthorized actions that could indicate an ongoing attack or security breach. Monitoring and analyzing such activity can help identify potential threats before they escalate.
A. Excessive activity in system logs
Excessive activity in system logs can be a strong indication of potential threats, as it may suggest abnormal or suspicious behavior within the IT environment. Monitoring system logs for unusual patterns, unauthorized access, or other irregularities can help organizations detect and respond to potential security threats.
The best indication of a potential threat is Excessive activity in system logs (Option A). This is because unusual or excessive activity could indicate a security incident or compromise, such as an ongoing attack or a breach. However, all the options mentioned could potentially indicate threats or issues, and the most suitable choice can vary depending on the specific circumstances and context.
This section is not available anymore. Please use the main Exam Page.CRISC Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Staanlee
11 months, 2 weeks agoefe6fee
11 months, 3 weeks agoK5000ism
1 year, 6 months agoKennethlim79
1 year, 7 months agokrishccie
1 year, 9 months agoshiowbah
1 year, 11 months ago