A security administrator is investigating a recent server breach. The breach occurred as a result of a zero-day attack against a user program running on the server. Which of the following logs should the administrator search for information regarding the breach?
A. Application log
B. Setup log
C. Authentication log
D. System log
Answer: A. Application log
Computer Science & Information Technology
You might also like to view...
A recursive search on a directory is one where:
a) a directory is searched and then all of its sub directories are searched. b) each sub directory is searched and then the main directory is searched. c) a search is done randomly on all directories. d) a and c. e) a and b
Computer Science & Information Technology
os.popen takes two arguments—________and_________ .
a) the shell command to execute, the function to call. b) the shell command to execute, the mode to use when calling the function. c) the function to call, the shell to use. d) None of the above.
Computer Science & Information Technology