ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 14 Topic 2 Discussion

ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 14 Topic 2 Discussion

212-82 Exam Topic 2 Question 14 Discussion:
Question #: 14
Topic #: 2

TechTonic, a leading software solution provider, is incorporating stringent cybersecurity measures for their Windows-based server farm. Recently, it noticed a series of unauthorized activities within its systems but could not trace back tot he origins. The company Intends to bolster Its monitoring capabilities by comprehensively analyzing Windows system logs. Which strategy should TechTonic prioritize to gain an insightful and effective analysis of its Windows logs, aiming to trace potential intrusions?


A.

Implement a centralized logging server and analyze logs using pattern-detection algorithms.


B.

Set up monitoring only for Windows Event Log IDs commonly associated with security breaches.


C.

Routinely back up logs every week and conduct a monthly manual review to detect anomalies.


D.

Focus solely on logs from critical servers, assuming other logs are less consequential.


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.