Audit logs and authentication systems

tlholmes4470tlholmes4470 Member Posts: 8 ■□□□□□□□□□
Which of the following could cause a Denial of Service (DoS) against an authentication system?

A . Encryption of audit logs
B . No archiving of audit logs
C . Hashing of audit logs
D . Remote access audit logs

Ok. To me this one is a little tricky. To my understanding A and C are good things when it comes to audit logs. That's as far as I got. Can anyone fill in the blanks and can someone tell me the correlation between authentication systems and audit logs?


  • iBrokeITiBrokeIT GICSP, GXPN, GPEN, GWAPT, GCFE, GCIH, GSEC, Sec+, eJPT Member Posts: 1,276 ■■■■■■■■■□
    Why does this question show up on a cheating website when I google it?
  • yoba222yoba222 Senior Member Member Posts: 1,109 ■■■■■■■■□□
    Come to think of it, the only thing the OP has posted since joining are CISSP questions.
    2017: GCIH | LFCS
    2018: CySA+ | PenTest+ |CCNA CyberOps
    2019: VHL 20 boxes
    2020: OSCP 2020
This discussion has been closed.