Ask Question
22 September, 19:40

One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes to the application data.

How can you design your logging system to verify authenticity of your logs?

A. Write the log concurrently in the cloud and on premises

B. Use a SQL database and limit who can modify the log table

C. Digitally sign each timestamp and log entry and store the signature

D. Create a JSON dump of each log entry and store it in Google Cloud Storage

+4
Answers (1)
  1. 22 September, 22:28
    0
    C

    Explanation:

    Based on the information provided within the question it can be said that the best way to accomplish this would be to digitally sign each timestamp and log entry and store the signature. This is because each timestamp and log entry would be ran through a verification algorithm which would then be stamped with your digital signature that requires your private keys, thus preventing forgery.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes to the ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers