Register
5:00
Stop
CISSP - Security Compliance - Security Event Logging and Monitoring
Advanced
1/5
Which of the following is a key consideration when configuring log aggregation for security event monitoring?
a.
Implementing real-time alerting for all collected log entries
b.
Establishing a centralized log repository with unlimited storage capacity
c.
Configuring log rotation based on the criticality of each system
d.
Ensuring consistent time synchronization across all logging sources
Advanced