List of questions
Related questions
Question 582 - SY0-601 discussion
A privileged user at a company stole several proprietary documents from a server. The user also went into the log files and deleted all records of the incident The systems administrator has just informed investigators that other log files are available for review Which of the following did the administrator most likely configure that will assist the investigators?
A.
Memory dumps
B.
The syslog server
C.
The application logs
D.
The log retention policy
Your answer:
0 comments
Sorted by
Leave a comment first