Which of the following statements correctly describe logs? Select three answers. A. Actions such as username requests are recorded in a network log.
B. A record of events related to employee logins and username requests is part of a server log.
C. SIEM tools rely on logs to monitor systems and detect security threats.
D. A record of connections between devices and services on a network is part of a network log.
The correct statements that describe logs are:
A. Actions such as username requests are recorded in a network log.
B. A record of events related to employee logins and username requests is part of a server log.
C. SIEM tools rely on logs to monitor systems and detect security threats.
Explanation:
– A is true because network logs track activities, including user actions like requests for usernames.
– B is accurate as server logs document all login activities and associated requests, which is essential for monitoring access.
– C is correct since Security Information and Event Management (SIEM) tools analyze logs to identify and respond to potential security issues.
D is not selected as it is less specific and does not encompass the main functions of a network log as well as the other statements. If you have any further questions or need more help, feel free to ask!