Which combination of controls should be used to protect against tampering with and unauthorized access to log files?

2 Comments

  1. Andrea
    Author

    As I recall, the answer is:
    Ensure that the log file integrity validation mechanism is enabled.

  2. Judy
    Author

    It appears that the answer is:
    Ensure that the log file integrity validation mechanism is enabled.

Leave a Reply to Judy Cancel reply

Your email address will not be published. Required fields are marked *

one × 3 =