A . Encryption of audit logsB . No archiving of audit logsC . Hashing of audit logsD . Remote access audit logs
Ok. To me this one is a little tricky. To my understanding A and C are good things when it comes to audit logs. That's as far as I got. Can anyone fill in the blanks and can someone tell me the correlation between authentication systems and audit logs?