Play It Safe: Manage Security Risks | Weekly challenge 3 Quiz |
Which of the following statements correctly describe logs? Select three answers.
- SIEM tools rely on logs to monitor systems and detect security threats.
- A record of events related to employee logins and username requests is part of a server log.
- Actions such as username requests are recorded in a network log.
- A record of connections between devices and services on a network is part of a network log.