List of questions
Related questions
Question 396 - CISSP discussion
To protect auditable information, which of the following MUST be configured to only allow read access?
A.
Logging configurations
B.
Transaction log files
C.
User account configurations
D.
Access control lists (ACL)
Your answer:
0 comments
Sorted by
Leave a comment first