CompTIA CySA+ CS0-003 Practice Question
Which of the following methods is BEST for ensuring the integrity of log files during incident response?
Cryptographic hashing
Regular backups
Access control mechanisms
Digital signatures
Which of the following methods is BEST for ensuring the integrity of log files during incident response?
Cryptographic hashing
Regular backups
Access control mechanisms
Digital signatures