Play It Safe: Manage Security Risks | Weekly challenge 3 Quiz |
Which of the following statements correctly describe logs? Select three answers.
- Security teams monitor logs to identify vulnerabilities and potential data breaches.
- Outbound requests to the internet from within a network are recorded in a firewall log.
- Actions such as login requests are recorded in a server log.
- Connections between devices and services on a network are recorded in a firewall log.