Which of the following is the BEST indication of a potential threat?
Which of the following is the BEST indication of a potential threat?
Excessive activity in system logs is the best indication of a potential threat because it can signal unusual or unauthorized actions within the IT environment, suggesting abnormal or suspicious behavior. Monitoring system logs for unusual patterns, unauthorized access, and inconsistencies can help detect and respond to potential security incidents before they escalate.
Excessive activity in system logs is the best indication of a potential threat because it may signal unusual or unauthorized actions that could indicate an ongoing attack or security breach. Monitoring and analyzing such activity can help identify potential threats before they escalate.
Excessive log activity
A. Excessive activity in system logs Excessive activity in system logs can be a strong indication of potential threats, as it may suggest abnormal or suspicious behavior within the IT environment. Monitoring system logs for unusual patterns, unauthorized access, or other irregularities can help organizations detect and respond to potential security threats.
The best indication of a potential threat is Excessive activity in system logs (Option A). This is because unusual or excessive activity could indicate a security incident or compromise, such as an ongoing attack or a breach. However, all the options mentioned could potentially indicate threats or issues, and the most suitable choice can vary depending on the specific circumstances and context.
A because threat is external and all other answers are related to vulnerabilities which is internal
A. Excessive activity in system logs