-
Q: What is Error #1 in log collection?A: Collecting everything without a plan (The 'Hoarder' mentality).
-
Q: What is the consequence of Error #1?A: Storage costs explode, and finding relevant data becomes impossible due to noise.
-
Q: What is Error #2?A: Ignoring the 'Chain of Custody'. Logs must be legally admissible.
-
Q: What is Error #3?A: Collecting logs but never looking at them (Write-only memory).
-
Q: What is Error #4?A: Relying solely on default logging configurations (which are often insufficient).
-
Q: What is Error #5?A: Not synchronizing time (NTP) across all devices.
-
Q: What is the impact of unsynchronized time?A: It makes event correlation impossible and ruins forensic timelines.
-
Q: What is Error #6?A: Failing to secure the logs (allowing attackers to delete their tracks).
-
Q: What is the recommendation for 'Log Format'?A: Standardize log formats (e.g., Syslog, CEF) to simplify parsing.
-
Q: What is the final error mentioned?A: Not having a retention policy (keeping logs too long or not long enough).
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.