Which of the following is an example of accounting in cybersecurity?

Prepare for the CompTIA IT Fundamentals Exam. Study with flashcards and multiple choice questions, each with hints and explanations. Get ready for your exam!

The choice of logs and tracking is indeed an example of accounting in cybersecurity. In this context, accounting refers to the processes that involve tracking, recording, and monitoring user activities and system events to ensure security and compliance. By maintaining detailed logs, organizations can audit actions, identify security incidents, and ensure that only authorized access and activities occur within their systems.

Logs serve as a critical tool for accountability, helping to trace actions back to specific users or processes, which is essential for forensic analysis during a security incident. This oversight is an integral part of maintaining a robust cybersecurity posture, ensuring that any anomalies or unauthorized access can be quickly detected and addressed.

While passwords, encryption methods, and firewalls are vital components of cybersecurity, they serve different purposes. Passwords focus on user authentication; encryption protects data confidentiality; and firewalls control network traffic and protect systems from unauthorized access. In contrast, logs and tracking provide the necessary accountability and oversight required to monitor user behavior and maintain security within the system.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy