CompTIA CySA+ CS0-003 Practice Question
Which of the following methods is BEST for ensuring the integrity of log files during incident response?
Cryptographic hashing
Regular backups
Digital signatures
Access control mechanisms
Which of the following methods is BEST for ensuring the integrity of log files during incident response?
Cryptographic hashing
Regular backups
Digital signatures
Access control mechanisms