Answer:
CAD ( d )
Explanation:
Richard should use CAD to create a cloud-based system, since he wants it to be a centralized repository of log files to be taken from the different servers associated with the organization
CAD ; Computer aided design software is the best software to be used because files created using CAD can be easily stored in cloud and it is easily accessible.
Watchdog Program
This program becomes the number one security mechanism for file access.
Pros:
- A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
- You are assured of having secure access to your file
Cons:
- It becomes a bottleneck.
- If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.
COPS
COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.
Pros:
- This program provides methods of checking for common procedural errors.
- COPS collect outputs and either mails the information to the admin or logs it in.
Cons:
- It could be modified by an intruder or even take advantage of its features.
- It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.
Answer:
because maybe it is have a virus...
The correct answer is malware