1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
4 years ago
8

Which of the following is a technique for storing or copying log events to acentralized logging server?a. Syslogb. Write­once re

ad­many (WORM) storagec. Unified Threat Management (UTM)d. Firewall logging
Computers and Technology
1 answer:
Neporo4naja [7]4 years ago
5 0

Answer:A) Syslog

Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.

Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.

Thus, the correct option is option (A).

You might be interested in
Which of the following words, if it replaced the word "enthusiasts" in the sentence above, would CHANGE the meaning of the sente
Sonja [21]

Answer:

I would need the sentence to make sure that I am correct but I am pretty sure it is C. aficionados

Explanation:

7 0
3 years ago
When a computer is booted the checks the computer's components?
CaHeK987 [17]
<span>When a computer is booted the checks the computer's components. No, </span>power-on self test (POST) checks the computers components. The OS will check for the OS errors and attached device functionality like printers/scanners/camera, availability of the network, mapped drives, etc.
8 0
3 years ago
Explain 2 ways in which data can be protected in a home computer??
Nonamiya [84]

Answer:

The cloud provides a viable backup option. ...

Anti-malware protection is a must. ...

Make your old computers' hard drives unreadable. ...

Install operating system updates. ...

3 0
3 years ago
What's wrong with Brainly now? Now people think it's site for s.ex which it isn't. These weirdos need to go
Dmitry [639]

Answer:

Honestly it is disgusting.

6 0
3 years ago
Read 2 more answers
Which two statements about using leased lines for your wan infrastructure are true? (?
Karo-lina-s [1.5K]
<span>The following statements are true: 1. Leased lines require little installation and maintenance expertise. ( A high service quality is offered by point-to point system) 2. Leased lines provide highly flexible bandwidth scaling. (This Allows a Constant availability)</span>
7 0
3 years ago
Other questions:
  • Integrated circuits are made up of _____ and carry an electrical current
    14·1 answer
  • What does nntp stand for?
    12·2 answers
  • Compare pseudocode and flowcharts for designing computer programs, and discuss the advantages and disadvantages of each.
    13·1 answer
  • Write a program in java using switch case statement
    11·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • Consider the following code snippet: int count = 0; int[][] numarray = new int[2][3]; for (int i = 0; i &lt; 3; i++) { for (int
    15·1 answer
  • Can someone help me please ??
    12·1 answer
  • Asking for certain data twice is
    6·2 answers
  • Write any two rules for writing algorithm​
    10·1 answer
  • You need to know more than just facts in order to use critical thinking skills.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!