Cyber AB Certified CMMC Assessor (CCA) Exam CMMC-CCA Question # 99 Topic 10 Discussion

Cyber AB Certified CMMC Assessor (CCA) Exam CMMC-CCA Question # 99 Topic 10 Discussion

CMMC-CCA Exam Topic 10 Question 99 Discussion:
Question #: 99
Topic #: 10

While examining a contractor's audit and accountability policy, you realize they have documented types of events to be logged and defined content of audit records needed to support monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activities. After the logs are analyzed, the results are fed into a system that automatically generates audit records stored for 30 days. However, mechanisms implementing system audit logging are lacking after several tests because they produce audit logs that are too limited. You find that generated logs cannot be independently used to identify the event they resulted from because the defined content specified therein is too limited. Additionally, you realize the logs are retained for 24 hours before they are automatically deleted. All of the following are required to satisfy AU.L2-3.3.1 – System Auditing assessment objectives [b] and [d], EXCEPT?


A.

Process identifiers


B.

Failure or success indications


C.

Timestamps


D.

File permissions


Get Premium CMMC-CCA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.