top of page

Unauthorised Access

The syslog entries shown here are part of a log file that spans several hours. Your task is to identify the recommended actions based on the provided log entries. What steps should be taken immediately in response to the event logged at 10:45?

Unauthorised Access

The log at 10:45 indicates unauthorised access to a sensitive database. Immediate actions should include isolating the affected system, revoking unauthorised access, and initiating an investigation to determine the extent of the breach.

ByteHerWay
Notice: The images on this website are generated using the AI tool provided by the WIX platform.
bottom of page