
Answer-first summary for fast verification
Answer: Digitally sign each timestamp and log entry and store the signature
The correct answer is C: Digitally sign each timestamp and log entry and store the signature. This method ensures the authenticity of logs by allowing verification that the log entries have not been tampered with. Digital signatures provide a cryptographic method to verify that logs are genuine and unchanged. Other options (A, B, and D) do not have mechanisms to verify the authenticity of logs. Option A focuses on redundancy, B on permissions without verification, and D on storage format without integrity checks.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company places a high priority on ensuring the trustworthiness of the data stored in its application. As part of your efforts to enhance security, you need to log all changes made to the application data. What is the best design for your logging system to ensure the authenticity of your logs?
A
Write the log concurrently in the cloud and on premises
B
Use a SQL database and limit who can modify the log table
C
Digitally sign each timestamp and log entry and store the signature
D
Create a JSON dump of each log entry and store it in Google Cloud Storage
No comments yet.