top of page
Unauthorised Access
The syslog entries shown here are part of a log file that spans several hours. Your task is to identify the recommended actions based on the provided log entries. What steps should be taken immediately in response to the event logged at 10:45?

The log at 10:45 indicates unauthorised access to a sensitive database. Immediate actions should include isolating the affected system, revoking unauthorised access, and initiating an investigation to determine the extent of the breach.
bottom of page