132 Chapter 6 ■ Security Assessment and Testing (Domain 6)
For questions 19–21, please refer to the following scenario:
The company that Jennifer works for has implemented a central logging infrastructure, as
shown in the following image. Use this diagram and your knowledge of logging systems to
answer the following questions.
Access
Points
Windows Desktop
Systems
Linux Web
Server Linux DatabaseServer
Data center
Firewall
Corporate Network Data Center
SIEM
Appliance
- Jennifer needs to ensure that all Windows systems provide identical logging information to
the SIEM. How can she best ensure that all Windows desktops have the same log settings?
A. Perform periodic configuration audits.
B. Use Group Policy.
C. Use Local Policy.
D. Deploy a Windows syslog client. - During normal operations, Jennifer’s team uses the SIEM appliance to monitor for excep-
tions received via syslog. What system shown does not natively have support for syslog
events?
A. Enterprise wireless access points
B. Windows desktop systems
C. Linux web servers
D. Enterprise firewall devices