Which of the following is a highly recommended method or technique for keeping firewall logs secure and uncorrupted?
A. Storing them in binary form
B. Using 15,000 RPM hard drives
C. Recording only important events
D. Centralized logging
E. Using timestamps
Answer: D