A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
A. Installing biometrics-based authentication
B. Configuring the router as a firewall
C. Periodically reviewing log files
D. Using smart cards with one-time passwords
A. Installing biometrics-based authentication
B. Configuring the router as a firewall
C. Periodically reviewing log files
D. Using smart cards with one-time passwords