Your company did not know its internal customer and financial databases were compromised until the attacker published sensitive portions of the database on several popular attacker websites. The company was unable to determine when, how, or who conducted the attacks but rebuilt, restored, and updated the compromised database server to continue operations. What is MOST likely the cause for the

company's inability to determine what really occurred?

A. too many layers of protection between the Internet and internal network
B. lack of a defined security auditing process
C. poor intrusion detection system placement and maintenance
D. insufficient logging and mechanisms for review

D
Explanation: The most likely cause for the company's inability to determine what really occurred is insufficient logging and mechanisms for review.
None of the other options is the most likely cause for the company's inability to determine what really occurred. The number of layers of protection should increase the likelihood that you can determine what really occurred. A defined security auditing process is important but only helps if proper logging and review mechanisms are in place. An intrusion detection system will detect incidents as they occur.

Computer Science & Information Technology

You might also like to view...

What is the code for a loop that iterates from the end of a string toward the beginning?

a. string::reverse_iterator i = s.begin() while ( i != s.end() ) { cout << *i; ++i; } b. string::reverse_iterator i = s.rbegin() while ( i != s.rend() ) { cout << *i; ++i; } c. string::reverse_iterator i = s.end() while ( i != s.begin() ) { cout << *i; --i; } d. string::reverse_iterator i = s.rbegin() while ( i != s.rend() ) { cout << *i; --i; }

Computer Science & Information Technology

In Windows applications, pressing the ____ and Tab keys simultaneously will move the focus backward.

A. Shift B. Ctrl C. Alt D. Ctrl+Shift

Computer Science & Information Technology