Audit logs and authentication systems
A . Encryption of audit logs
B . No archiving of audit logs
C . Hashing of audit logs
D . Remote access audit logs
Ok. To me this one is a little tricky. To my understanding A and C are good things when it comes to audit logs. That's as far as I got. Can anyone fill in the blanks and can someone tell me the correlation between authentication systems and audit logs?