1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
9966 [12]
4 years ago
8

Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au

thorized users?A. Access control lists (ACLs) on log data drivesB. Deployment of write once read many (WORM) drivesC. Disk encryption using hardware security modules (HSM) on log data drivesD. Implementing the principle of least privilege on log data drives
Computers and Technology
1 answer:
AnnyKZ [126]4 years ago
7 0

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

  • SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.
  • No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.
You might be interested in
PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
DaniilM [7]

Answer:

1. would be B.

2. would be D

3. May I ask if it can be multiple answers?

Explanation:

1. In coding a if statement has to follow if something is true or not. If we are talking about a if and then statement it will skip that block and move to the next block of the "then" part of the "if then" Statement if the first part is reported false

2. This is a easy one, so it has to be either a 3.25 GPA or higher or they have to have either 100 hours or more.

3. waiting for a comment back :)

4 0
4 years ago
How do computers use input and output to get and give the information that they need to solve problems?
SpyIntel [72]

Answer:

typing on a keyboard (input) makes letter appear on a screen (output)is removing that

5 0
3 years ago
Explain why microcomputers are installed with TCP/IP protocols?​
Kay [80]

Answer:

microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet

7 0
3 years ago
What is a job that was created by automobiles
jasenka [17]

many jobs were created, such as, but not limited to, factory worker, inspector, etc.

8 0
3 years ago
Describe how computer are used in ticket counter?​
m_a_m_a [10]

Answer:

These systems are commonly used in facilities such as public libraries to ensure equitable use of limited numbers of computers. Bookings may be done over the internet or within the library itself using a separate computer set up as a booking terminal.

6 0
3 years ago
Other questions:
  • A raised dot (ú) shows where the enter key was pressed. true or false.
    13·1 answer
  • Write an algorithm that receives 500 numbers from the user and prints out the maximum of the numbers.
    9·1 answer
  • Technician A says that automotive engine blocks are usually classified by the number of cylinders the block. Technician B says t
    9·1 answer
  • Write a statement that declares an int variable named count.
    9·1 answer
  • ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1
    6·1 answer
  • Which careers have the highest minimum experience requirement?
    14·1 answer
  • In classical conditioning, _____ means that the CS and US are presented closely together, whereas _____ means that the CS is a g
    6·1 answer
  • Write a VB program to convert a temperature from Celsius to Fahrenheit and vice versa.
    15·1 answer
  • Please help me!!!!!!!!
    5·2 answers
  • Service provided by multiple servers acting in parallel is referred to as: a. Multiple-phase queuing system b. Multiple-channel
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!