Which of the following is a highly recommended method or technique for keeping firewall logs secure and uncorrupted?

Which of the following is a highly recommended method or technique for keeping firewall logs secure and uncorrupted?





A. Storing them in binary form

B. Using 15,000 RPM hard drives

C. Recording only important events

D. Centralized logging

E. Using timestamps


Answer: D


Learn More :

Firewalls
Network Security
VPNs

Learn More Multiple Choice Question :