exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 177 discussion

Actual exam question from CompTIA's SY0-601
Question #: 177
Topic #: 1
[All SY0-601 Questions]

Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?

  • A. Set up hashing on the source log file servers that complies with local regulatory requirements.
  • B. Back up the aggregated log files at least two times a day or as stated by local regulatory requirements.
  • C. Write protect the aggregated log files and move them to an isolated server with limited access.
  • D. Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 9 months ago
Selected Answer: A
Set up hashing will provide integrity
upvoted 18 times
daddylonglegs
1 year, 7 months ago
Re-read the question. The question asks about integrity of the AGGREGATE logs. Answer choice A only mentions hashing the source logs. Either way, hashing does not *provide* integrity. Rather, hashing will detect whether or not the integrity of a particular piece of data is maintained, but hashing on it's own will not ENSURE the integrity. You need a preventative control, which would be storing on a write-protected server.
upvoted 12 times
...
...
mosher21
Highly Voted 2 years, 1 month ago
Selected Answer: C
I say C. The way SIEM protects logs is by write protecting them. Quote from Darill Gibson's securit+ 501 book, "Logs/WORM: A SIEM typically includes methods to prevent anyone from modifying log entries. This is sometimes referred to as write once read many (WORM). As logs are received, the SIEM will aggregate and correlate the log entries. After processing the logs, it can archive the source logs with write protection."
upvoted 15 times
HCM1985
1 year, 9 months ago
I personally agree with C because we must ENSURE integrity, not just check if files were tampered with.
upvoted 7 times
Dima1993
1 year, 2 months ago
By comparing the hash values of the original log files with the hash values of the log files stored within the SIEM, organizations can verify the integrity of the log files and detect any unauthorized modifications or tampering.
upvoted 3 times
...
...
...
Fart2023
Most Recent 1 year, 1 month ago
Selected Answer: C
The correct answer is C. Write protect the aggregated log files and move them to an isolated server with limited access. Here’s a breakdown of why option C is the best choice for ensuring the integrity of aggregated log files within a Security Information and Event Management (SIEM) system: Write Protection: This prevents any modifications to the log files after they are created. Once logs are written, protecting them from changes ensures that the data remains trustworthy and tamper-proof. Isolated Server with Limited Access: By storing the logs on an isolated server, you reduce the risk of unauthorized access and potential tampering. Limited access control ensures that only designated personnel can interact with the logs, further securing the integrity of the data.
upvoted 2 times
...
RyanL26
1 year, 1 month ago
Selected Answer: A
HASHING = INTEGRITY. Anytime I see the keyword "integrity" in these questions, I glace at the answers and see hashing.
upvoted 1 times
...
BD69
1 year, 3 months ago
Selected Answer: C
Hashing source log files does nothing to ensure the integrity of aggregated log files. Technically, all answers here are wrong. You should hash the aggregated log files AND move them to an isolated server.
upvoted 1 times
...
Paula77
1 year, 3 months ago
Selected Answer: C
Once the log files are aggregated, they cannot be tampered with, as write protection prevents any modifications. Moving them to an isolated server with limited access further enhances security by reducing the risk of unauthorized access.
upvoted 2 times
...
Payu1994
1 year, 4 months ago
Option A, “Set up hashing on the source log file servers that complies with local regulatory requirements,” is indeed a security measure, but it doesn’t directly ensure the integrity of the aggregated log files within a SIEM. Hashing is used to verify the integrity of data during transmission or storage, ensuring that the data hasn’t been tampered with. However, this measure is typically applied at the source log file servers, not on the aggregated log files within the SIEM. On the other hand, option C, “Write protect the aggregated log files and move them to an isolated server with limited access,” directly targets the aggregated log files in the SIEM, ensuring their integrity by preventing unauthorized access or modifications. So, while both options are security measures, option C is more directly related to the question’s focus on the integrity of aggregated log files within a SIEM.
upvoted 2 times
...
klinkklonk
1 year, 4 months ago
Selected Answer: C
Because you need to ensure integrity.
upvoted 1 times
...
EighthNotes
1 year, 4 months ago
Selected Answer: C
I personally agree with C because we must ENSURE integrity, not just check if files were tampered with.
upvoted 1 times
...
buscan422
1 year, 5 months ago
Selected Answer: C
The correct answer is C. Write protect the logs https://www.techtarget.com/searchsecurity/tip/Security-log-management-and-logging-best-practices
upvoted 2 times
...
MortG7
1 year, 5 months ago
Hashing DOES NOT ensure integrity..it will only tell you if it is different/altered/changed. Answer is C.
upvoted 1 times
...
ImBleghk
1 year, 5 months ago
Selected Answer: A
A. Set up hashing on the source log file servers that complies with local regulatory requirements.
upvoted 1 times
...
PropheticBettor
1 year, 6 months ago
Cant be hashing because hashing isn't even secure without salting
upvoted 1 times
...
ganymede
1 year, 6 months ago
Selected Answer: C
It's C. From Darril Gibson's Sy0-601 book: "The following list outlines some additional capabilities shared by most SIEMS: - log collectors - data inputs - log aggregation - correlation engine - reports - packet capture - user behavior analysis - sentiment analysis - security monitoring - automated triggers - time synchronization - event deduplication - Logs/WORM: A Siem typically includes methods to prevent anyone from modifying log entries. This is sometimes referred to as write once read many (WORM). As logs are received, the SIEM aggregates and correlates the log entries. After processing the logs, it can archive the source logs with write protection."
upvoted 2 times
...
TheFivePips
1 year, 7 months ago
Selected Answer: C
C. Write protect the aggregated log files and move them to an isolated server with limited access. This option directly addresses the integrity of the aggregated log files within the SIEM. Write protection helps prevent any unauthorized changes or tampering with the log data, while isolating the files on a server with limited access enhances security and controls over who can access and modify them. Option A (setting up hashing on the source log file servers) is also a good practice for ensuring log file integrity at the source level, but it may not directly address the integrity of aggregated log files within the SIEM, which was the specific focus of the question. Therefore, for maintaining the integrity of aggregated log files in the context of a SIEM, option C would be the more suitable choice.
upvoted 1 times
...
IGasset
1 year, 7 months ago
Selected Answer: C
C ensures that the log files are protected from unauthorized modifications and are stored in an environment with restricted access, which helps maintain their integrity and prevents tampering.
upvoted 1 times
...
demianUY
1 year, 7 months ago
Selected Answer: C
This is clearly C, as explained by others.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...