Which of the following log security technologies is prone to unauthorized interim modification of the log files? Network Security Which of the following log security technologies is prone to unauthorized interim modification of the log files? a. Printer logging b. Remote logging c. Secure logging d. Digitally signed logging Answer: d. Digitally signed logging Learn More : Share this Share on FacebookTweet on TwitterPlus on Google+