Excessive activity in system logs is the best indication of a potential threat because it may signal unusual or unauthorized actions that could indicate an ongoing attack or security breach. Monitoring and analyzing such activity can help identify potential threats before they escalate.
A. Excessive activity in system logs
Excessive activity in system logs can be a strong indication of potential threats, as it may suggest abnormal or suspicious behavior within the IT environment. Monitoring system logs for unusual patterns, unauthorized access, or other irregularities can help organizations detect and respond to potential security threats.
The best indication of a potential threat is Excessive activity in system logs (Option A). This is because unusual or excessive activity could indicate a security incident or compromise, such as an ongoing attack or a breach. However, all the options mentioned could potentially indicate threats or issues, and the most suitable choice can vary depending on the specific circumstances and context.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Staanlee
4 months agoefe6fee
4 months, 1 week agoK5000ism
10 months, 3 weeks agoKennethlim79
11 months, 3 weeks agokrishccie
1 year, 1 month agoshiowbah
1 year, 3 months ago