1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
15

When securing a system, why is it important to audit failed attempts to access files?

Computers and Technology
1 answer:
NARA [144]3 years ago
7 0

Answer:

Auditing failed attempts are important because it helps keep track of the activities which may have been attempts to access the secure files without proper authentication. It is important for the security of the sensitive information in the system.

Auditing ensures the safe and secure environment for a system where all the sensitive and important data remains safe by keeping the unauthorized users from accessing it.

Explanation:

Solution

When a failure auditing is enabled, the every time unsuccessful tries to access the files by a user occurs, an audit entry is generated. the files server auditing is a very crucial step towards securing a system.

With a record of all failed trial made to access the file, investigations in a case of breach in data is quite simple. it also helps is identifying the client computer from which the failed attempts were carried out.

Therefore, file auditing is very necessary in securing a system.

You might be interested in
Where does the oracle11g server store information about objects in the database, including information about constraints?
tiny-mole [99]
The oracle11g server stores information about objects in the database, including information about constraints in the tables.  <span>An </span>Oracle database is a set of files that store Oracle data in persistent disk storage.<span>A database </span>instance<span> is a set of memory structures that manage database files</span>.
4 0
3 years ago
Describe Mr. Digby, the principal. ​
Gennadij [26K]

Answer:

stinky

Explanation:

7 0
3 years ago
Audacity functions with a computer that has a minimum of ______ of RAM and a 300 MHz processor.
soldier1979 [14.2K]
If i remember correctly...it should be 64 MB
Hope this helps
5 0
3 years ago
Read 2 more answers
A device that protects electronic equipment from an increase in power, but not a decrease or outage is a ___.
Basile [38]

Answer: A) Battery backup

Explanation:

 A battery backup are used to provide the source of power backup to various hardware components and desktop computers. In many cases, the devices are plugged into UPS ( uninterruptible power supply) for backup power and it is also depend upon the size of the UPS.

All the battery backups are located inside so that is why, the devices are heavy in weight. Usually, the battery backup front required additional button for performing various functions.

And the battery backup devices are manufacture by using the varying degree of backup abilities.

8 0
3 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
Other questions:
  • Don is the superintendent of the county school system. What task might Don
    8·1 answer
  • Prior to the development of e-commerce, web sites primarily delivered static html pages. true
    11·1 answer
  • Convert the following pseudocode to C++ code. Be sure to define the appropriate variables. Store 25 in the speed variable. Store
    5·1 answer
  • What is the quickest way to change the format of a table?
    8·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • Jin needs to add a row into his spreadsheet, but he does not want to remove any existing data. Which combination of options shou
    6·2 answers
  • Which button should be utilized if a user is unsure whether or not they are the right person to reply to an email?
    6·2 answers
  • Please Help Me!!!!!!!!!!!!!
    5·1 answer
  • PLEASE HELP!!! THIS IS DUE TODAY! WILL MARK BRAINLIEST!
    5·1 answer
  • You have a team member on a remote project who is not fluent in English and
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!