• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which approach is intended to prevent exploits that target syslog?

  • Use syslog-ng.
  • Use a Linux-based server.
  • Use a VPN between a syslog client and the syslog server.
  • Create an ACL that permits only TCP traffic to the syslog server.
Answers Explanation & Hints:

Hackers may try to block clients from sending data to the syslog server, manipulate or erase logged data, or manipulate the software used to transmit messages between the clients and the server. Syslog-ng is the next generation of syslog and it contains improvements to prevent some of the exploits.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 24 – 25: Protocols and Log Files Group Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments