1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
4 years ago
12

You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th

rough 4–7. Think about the various systems on a network and develop a logging policy based on the information in the aforementioned sections.
Computers and Technology
1 answer:
Kitty [74]4 years ago
4 0

<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>

Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.

It is a security device and purpose to make organization to access or connected to end use of other networks.

Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN

Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers.  Keeping network logs is policy driven. So network administrator keeps logs for no. of days.

Some network administration export log and keep as reference.

You might be interested in
To save a new copy of an existing database, a user can open the original database and select ________ from the file tab.
Yuri [45]
And select copy from the file tab.
6 0
3 years ago
This is gonna be very long but I have no idea what to do, I'm confused.
kaheart [24]

for such experiment, you do it with care and to acquire and determine to put experience in it

Explanation:

because without you been or using experience the experiment will not correct

8 0
3 years ago
Please please help me
Sholpan [36]

Answer:

increase your browser security settings

8 0
3 years ago
Should I download RAM on my computer?
jenyasd209 [6]

Well, if you want to, make sure it's safe.

I don't know what RAM really is, but check if it's safe first. And maybe talk it out with your parents.

That's all I gotta say!

7 0
3 years ago
Read 2 more answers
A(n) ________ converts your voice's sound waves into digital signals.
Montano1993 [528]
Analog-to-digital converter chip
8 0
3 years ago
Other questions:
  • 6.12 Nested Increments Write a program for spiritual lumberjacks who want to show their appreciation for each tree they 'kill' b
    12·1 answer
  • What is a device that makes it possible for multiple customers to share one address is called a/n
    12·1 answer
  • The first step in the five-step process for problem solving is to ____. take action complete the task understand the task or nee
    10·2 answers
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • Write a Java program that will 1. Ask the user to type in a sentence, using a JOptionPane.showInputDialog(). 2. The program will
    10·1 answer
  • A device that connects to a network without the use of cables is said to be?​
    13·1 answer
  • List all the components of a computer
    14·2 answers
  • Tools used to type text on Ms -paint​
    10·1 answer
  • All of the following are true about data science and big data except: a.Digital data is growing at the rate of 2.5 quintillion b
    15·1 answer
  • Write steps of the following operations.<br>a. applying borders and spacing<br>b. create a folder​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!