Which of the following is regarded as an ideal event logging practice?
-
A
Transmit all event logs to a central log server
-
B
Encrypt all event logs on the systems that create them
-
C
Retain all event logs on the systems that create them
-
D
Suppress the creation of event logs on all systems