A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Configuring your router as a firewall (option B) is a basic security measure to prevent unauthorized access to your network from outside, but it does nothing to detect intrusion attempts. Firewalls typically provide protection by blocking unauthorized traffic, but they do not generate detailed logs of attempts.
Therefore, for the specific purpose of detecting intrusion attempts, the most effective method is to regularly review log files.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
RS66
4 months, 1 week agoPurpleParrot
1 month, 2 weeks agoSwallows
4 months, 1 week ago