Which of the following would BEST help to ensure that suspicious network activity is identified? A. Analyzing server logs B. Coordinating events with appropriate agencies C. Analyzing intrusion detection system (IDS) logs D. Using a third-party monitoring provider Suggested Answer: C This question is in CRISC exam For getting Risk and Information Systems Control Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer