Which of the following log security technologies is prone to unauthorized interim modification of the log files?

Which of the following log security technologies is prone to unauthorized interim modification of the log files?




a. Printer logging

b. Remote logging

c. Secure logging

d. Digitally signed logging


Answer: d. Digitally signed logging


Learn More :

Network Security

Learn More Multiple Choice Question :